Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 21:10

General

  • Target

    36655a0b11773cacf42ec2ca9ca3ec50_JaffaCakes118.exe

  • Size

    200KB

  • MD5

    36655a0b11773cacf42ec2ca9ca3ec50

  • SHA1

    64c4be9d982d56106f7d8167c07295da4d9d8e0d

  • SHA256

    9df5a67c5941d24ac50ad1dd41f73a4438850f30b111d45c154a69b5d0573907

  • SHA512

    e5e6c7be87fbf10e2106af4635cc6a3a4bf67ef83e01d7802c29c97793759b452d3e30381124ae80754035b19acd7e380f743eb4f2ad8bef3a671ca80159580b

  • SSDEEP

    3072:wR7To/05Wr0tQ9nLHbB9WBJiBs2HWWEaPGJm9wFH:wRix4QxL7B9WBJi+yWWEaUjJ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36655a0b11773cacf42ec2ca9ca3ec50_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\36655a0b11773cacf42ec2ca9ca3ec50_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Users\Admin\roaboa.exe
      "C:\Users\Admin\roaboa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\roaboa.exe

    Filesize

    200KB

    MD5

    051c236a64a42569e2a6b91a9ec0e50b

    SHA1

    e9524cea690c7fda91bd9d257ad5498840575219

    SHA256

    170e70c1176625624c5afc311beadc55556978e22eb9913f7c9359637fc57517

    SHA512

    75a35ee0ad9a40e20522022764ee4619826cb7da6f882be784742fd3c9b0c6a0d07e233b8f4439bfc8aa0cee64d0c801a8051f0749b5b720775f18838512f2d5