Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 23:25

General

  • Target

    36d1879ee37ea792b98517c1614f0c6e_JaffaCakes118.exe

  • Size

    148KB

  • MD5

    36d1879ee37ea792b98517c1614f0c6e

  • SHA1

    cec84f5ef1200849239cc84cc62e40184a4399eb

  • SHA256

    df8ccc38121b8e4d9c41cde612464948469bb302f52153ccbb31bbee71734f51

  • SHA512

    70831c2edb6d3e2286bba0d60e161e059218eb03306bdb204aa3663a78b8cd858776cd33bec3954565e9d0d41c56c716297bc274fe5d43d824d2cf17819d5eb8

  • SSDEEP

    3072:Ado+tgRs59j/pvkqBBac+RAGq1bg7Yfgst6OzOS79pgRZkhQJAOAI4oQZiEwSt5:uoibj/pvkqBBac+RAGq1bZHtrzOS77kM

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36d1879ee37ea792b98517c1614f0c6e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\36d1879ee37ea792b98517c1614f0c6e_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Users\Admin\xoaedi.exe
      "C:\Users\Admin\xoaedi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\xoaedi.exe

    Filesize

    148KB

    MD5

    3467b407d8596bbe275f28e704d49cce

    SHA1

    bac750209a3df144b46ed37231ee53b69562e1c1

    SHA256

    80ee6c600745f162bc92ac6958d226e00ee01b049259a288f46a090467835432

    SHA512

    11d312d05e381b8d35547545ef8057534ae15b26ba6d18967b71f527c11d4b832c39d2b220932f775c43cd01e558339245565510dcf61a94e43fdcf59b53367b