Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-07-2024 01:15

General

  • Target

    32bee7ef4ff81ea583f9891dce75a4b7_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    32bee7ef4ff81ea583f9891dce75a4b7

  • SHA1

    07042045a89802597afaa7904f2355acde96d39a

  • SHA256

    060e2985f79e58d6f7541d435598c42b3e70d9d529c997f931f5b8eb517f4f07

  • SHA512

    df7336b0b5717c7e5ca0802bd15a080af3b81e16d6942686e1307a926a08c808454c4edf0ffbe482fb69c2cb6f51c43b1e1e811b20a94e0bfb4fb4b4a8b5153c

  • SSDEEP

    1536:1MEL4wRevuBxLDtVdHa27J14lWxporZ45ioNeG0h9:6EL4wRevkLt6gJ1uPt45y9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32bee7ef4ff81ea583f9891dce75a4b7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\32bee7ef4ff81ea583f9891dce75a4b7_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4268
    • C:\Users\Admin\yoonii.exe
      "C:\Users\Admin\yoonii.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yoonii.exe

    Filesize

    124KB

    MD5

    760cf45d280673b17e3feaa4d1162e80

    SHA1

    f1a64b6336f4a8a307109912e60b146c2699db1d

    SHA256

    5375773bd1ec482069c611f6428533ccf5d75282c12e9fe673ec5d8771ff09b3

    SHA512

    d3467ca2d87c36f851aa774d1f3fbd8174c53fdf1d0cf4e32939bdd14208ed8c6513b9677bee4510ff0f9da16e8df2bc8108cc909487ca84db22f5faa892dab1