Analysis

  • max time kernel
    150s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 13:50

General

  • Target

    34fb3a8d9da04019cc4546f75c92f5ba_JaffaCakes118.exe

  • Size

    208KB

  • MD5

    34fb3a8d9da04019cc4546f75c92f5ba

  • SHA1

    2e37a2494007876605b1324e4fa48add7fde1658

  • SHA256

    154f7e6540f47a2526018e065652b2ec3dd1a35d7dc43d720655557c3c6bd5f2

  • SHA512

    f2eac412019e9bf744cc8dfb214fc48c93dff75df2e339cda6cce4830d83b2259ca08be1bbf848524a645707cca40c5fd95facda9a9ccfacaeecf90512c1029c

  • SSDEEP

    3072:jDMM1fnDpY979aAqvxpDWDhQx9AhHp8NeqxEN1yy8p+uxb/:j5f6oA8pDqQx9AhJSRxiJ8jt/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34fb3a8d9da04019cc4546f75c92f5ba_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\34fb3a8d9da04019cc4546f75c92f5ba_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Users\Admin\mvkuac.exe
      "C:\Users\Admin\mvkuac.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\mvkuac.exe

    Filesize

    208KB

    MD5

    83790a5e4712aac21ab32119401bccd6

    SHA1

    b569e66ff0309f0c2eacea28938558b08cfad827

    SHA256

    16cf279e8940f1b6d5c59aa00068b15e09489dfcfdede19cdf86c85a3694686b

    SHA512

    cee40adc944f805001838a807def9ba0d707117f15c97d23703c941a58703a9726398e3427010bf35483ab34d8b1ef45d8bbee1dfc8d510f06dff97838fca50c