Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 17:28

General

  • Target

    314d511e4a9d887862f6a649bd06e181_JaffaCakes118.exe

  • Size

    96KB

  • MD5

    314d511e4a9d887862f6a649bd06e181

  • SHA1

    cf434c9c148b39ebc4818c271f312a995dc1a557

  • SHA256

    8c2f96f4c2d1d0e97c9228644e51830ba1bee84948c5f7ec127311e219ab7c79

  • SHA512

    c7b76bb4dd6e4a9a7568089708e3046316109c04e044e5b695c773ebdd3431b4ba2ea4ed375ba09972c0cd4695b4aaa3005f7932b3cfe263a41c07cfb53a03a2

  • SSDEEP

    1536:P3AEg52N9tyVQO8P8ychawjj3RJNEo/knRzdnynE7RldNEP8lijOe/NIjnZDH:PwE/NelychLzR3Ek65Rldq/CnVH

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\314d511e4a9d887862f6a649bd06e181_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\314d511e4a9d887862f6a649bd06e181_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Users\Admin\kaauhiw.exe
      "C:\Users\Admin\kaauhiw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\kaauhiw.exe

    Filesize

    96KB

    MD5

    096eaf5d99a210424004627afde1357d

    SHA1

    14f0734d64019526f0f9349956b47017676d5498

    SHA256

    8a81f6e3d3c3b2fb76f9c6c343c06f9af89f84d74b37ad14d71b819cc0ff5ac8

    SHA512

    700837dc3f49a2d29b23c97066f42facfd77b0d7eb5906dd9f4fa432fc947808da746344756d4cd19dd1edd13f7c7edd1a363d580f3455ae5e22b26fdabe6ee5