Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 03:21

General

  • Target

    331cf8f08974faa48c156455419ad24d_JaffaCakes118.exe

  • Size

    220KB

  • MD5

    331cf8f08974faa48c156455419ad24d

  • SHA1

    bb8684232c77c4825fc576a0c37f901fb0a74a84

  • SHA256

    19f17b7794358fcf7ecc35d550e308fe36671e0b100c3b95842793001bfa1401

  • SHA512

    d3797e0c63bd29741305001ddba572b5c69bbe980d96086c3e7880852f1b1907264d5aae3273d4e961f07ab9c049589054a58a431c92a94b8bf9a753f67c1030

  • SSDEEP

    3072:329ecmKwcyAHtyU472ydts1Vsd0WpPGFobtkBdk3ENw:5tR6EUEts1VseWpPGFobC3k3EN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\331cf8f08974faa48c156455419ad24d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\331cf8f08974faa48c156455419ad24d_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:468
    • C:\Users\Admin\niicour.exe
      "C:\Users\Admin\niicour.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\niicour.exe

    Filesize

    220KB

    MD5

    94c9679d36a3fef02ef83db096e7eb1e

    SHA1

    18aee224731742b08eb4964a144d7813e1ecb149

    SHA256

    a5b9da302ec4820b66dac2b0e90b699c8b764fd32414bd750b0a231c371ff1bf

    SHA512

    9e33392b6f796cdafea109cdfc447a01ab408eab34d4e2cf316be02c8b6f113366fa2d5b9a33175fa017da05724087576294c5de860019050af366a2132885dc