Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 18:49

General

  • Target

    3e77fb06c681685797d03d4b56050380_JaffaCakes118.exe

  • Size

    80KB

  • MD5

    3e77fb06c681685797d03d4b56050380

  • SHA1

    7c782532acd7c6c665c2951c1093a2ecdcd3cd42

  • SHA256

    1bfabbd6a698f9cbe4b0dae3f2119d190902766fc10a69a4ee5bd3a5773a1b82

  • SHA512

    eca52fb9ad9c14393d41d25b848075ba2df5299ab332fcfc7a235e0b4d905cd7ea6ea4af359930aece21e51bd027f0dccf507a47fa3ea235d75b1992b6d92cfb

  • SSDEEP

    768:mT9BZytGl2wKCq4j4NAis0AbbNXYXQpA2jLw4VnQP87gC7xlRPbE9xm1pSqRWGu6:mzZyv4bTOi0ZbL/7+qkwm3yo+Z0p

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e77fb06c681685797d03d4b56050380_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3e77fb06c681685797d03d4b56050380_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Users\Admin\couexof.exe
      "C:\Users\Admin\couexof.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2720
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 780
      2⤵
      • Program crash
      PID:264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\couexof.exe

    Filesize

    80KB

    MD5

    a4ec97040b6948d4739f64a3538bb48d

    SHA1

    717db93d1f8d44228908c8289ad19b65ef706f68

    SHA256

    5a348d79d6dd8b92bd39521c11d95c0d2984469507906dc96c097612bafad8de

    SHA512

    0bef8982e69f57266d70969ab802154204bbe22dcc28a71da6f54a61b3a3c7dbbc9438020e2c5d57064e5ffd8a431013c3a1fc68c6ce954425c38536514d4b80