Analysis

  • max time kernel
    150s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 13:50

General

  • Target

    34fb3a8d9da04019cc4546f75c92f5ba_JaffaCakes118.exe

  • Size

    208KB

  • MD5

    34fb3a8d9da04019cc4546f75c92f5ba

  • SHA1

    2e37a2494007876605b1324e4fa48add7fde1658

  • SHA256

    154f7e6540f47a2526018e065652b2ec3dd1a35d7dc43d720655557c3c6bd5f2

  • SHA512

    f2eac412019e9bf744cc8dfb214fc48c93dff75df2e339cda6cce4830d83b2259ca08be1bbf848524a645707cca40c5fd95facda9a9ccfacaeecf90512c1029c

  • SSDEEP

    3072:jDMM1fnDpY979aAqvxpDWDhQx9AhHp8NeqxEN1yy8p+uxb/:j5f6oA8pDqQx9AhJSRxiJ8jt/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34fb3a8d9da04019cc4546f75c92f5ba_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\34fb3a8d9da04019cc4546f75c92f5ba_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Users\Admin\lienuu.exe
      "C:\Users\Admin\lienuu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\lienuu.exe

    Filesize

    208KB

    MD5

    4970a4544bc486f21329f97e74ef69df

    SHA1

    70cadb84c3ce4389d1ebc9aa15e90efdcc8f11e3

    SHA256

    61339889908f2bf1b7a4c2236ecf165bd86343acdd92de03554f32c772c8a033

    SHA512

    e84c7b900d110935f0f8a7dc993cbf668ce0a3c21cbd09c05808ea4f20a2e2c69c66b2df420268cd3772c20f8f7f667c66132be83ed9a66b38858e172b52edba