Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 11:57

General

  • Target

    3903f868b556d1657450308e91570f3b_JaffaCakes118.exe

  • Size

    172KB

  • MD5

    3903f868b556d1657450308e91570f3b

  • SHA1

    229eea0585655464e92738be2263ce6393baae8f

  • SHA256

    95df568181bcca37b82115cf4bbf2311ec8c94e3ea53b83e5af53652545c1db4

  • SHA512

    30b60402467e605c7f67a7ccd0b0b6eeb1ac25782f96e43dd8a3f44cfc63b3b05b7c87b7dbe65e74c3aa816b03a369269d859d0c2ba6118bb6bf592a1ebcb6bb

  • SSDEEP

    3072:h7fU4GhbMi7Rxi/6Knvmb7/D26iv6oPiW3f9K4/5caJxg3Xu7BC3C//pcjwQ9AO:RShbMi7rHKnvmb7/D26iioPiW3f9Zcaa

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3903f868b556d1657450308e91570f3b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3903f868b556d1657450308e91570f3b_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Users\Admin\dfyak.exe
      "C:\Users\Admin\dfyak.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\dfyak.exe

    Filesize

    172KB

    MD5

    d3511f25a8a8f024e8c9d5f58b42fc8d

    SHA1

    ad384b6bb06296790590b505e536c25cafb4bbce

    SHA256

    ee952e978e400bd88f5c5e72b1405fbba25e0f7ac1bec8fc6a34b6d00a485fa8

    SHA512

    3ea1e29a1154125021023837bee02a47bcdbe4ab4d6d1147089fddbbd85d243d7396f6783bf86cdf3a5c13801c39234c20293b15fcf09d0d45203b8decf7d01d