Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 23:38

General

  • Target

    3f53a4d5150b83402cc1a72cc9a24595_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    3f53a4d5150b83402cc1a72cc9a24595

  • SHA1

    79d6603325a213e7eb4c010dc5da4eb453fcc921

  • SHA256

    a69a4d48729c65b95303ef818e6eeaf7153e752047e7157eecfbb8cc52c1a8ff

  • SHA512

    b96bee9401b623001b0b2c0fb946780bee9061b44be8ac614c4a3d5fbb4d5fab52e08008f57b46fceb40e393e30188a6bfbdc0756e70bb19496a5f4d996b1f9e

  • SSDEEP

    1536:MJbQEFOhX/67NxkiQixA+alh98r8Y9USv1jy5wo7JaSh:gbQEFw/67gjH8ri8IwQj

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f53a4d5150b83402cc1a72cc9a24595_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3f53a4d5150b83402cc1a72cc9a24595_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\taeodu.exe
      "C:\Users\Admin\taeodu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\taeodu.exe

    Filesize

    124KB

    MD5

    384e05fd7db9aeb0a622ecba7eb7fb2b

    SHA1

    eaf6a3d1ae885051be76ac4580c0104819582945

    SHA256

    813c02808f51747ebd0a44572f34fe6127915b8cd9cb2398edc29009e063172d

    SHA512

    896082d05c00b3e205f153fe2a63532df2337ea4ec252a20443cf44b06f29b33b54f67e662c733d80ad137f011c4730ce4f5075cd137533f46cea55ffee0721a