Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13-07-2024 00:24

General

  • Target

    3f7b561be08aec128023f1732339c780_JaffaCakes118.exe

  • Size

    248KB

  • MD5

    3f7b561be08aec128023f1732339c780

  • SHA1

    7ef61956e1c0ea6816d450e430b911abec04b5c5

  • SHA256

    85d605ad89f22fffc577ad5999011029f1b5bc87689963f902a78e258ca48839

  • SHA512

    7fc36696020d68df5879dfc82c061a634ae6447a845ac471cdd00d1d6203d3ad2e32516ad80bce473c334443a1c92ba2f0ee759008702765e0c667479f98b483

  • SSDEEP

    1536:uT6u3c9YJmU9+Dkl8NMhgoAeK6Kg0xCZTqUX3wkSQ7tNXZKl/YWAISDKow5z/GH3:w6u3kTU0DklPANxCLX3uDcdZDZH

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f7b561be08aec128023f1732339c780_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3f7b561be08aec128023f1732339c780_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\piolo.exe
      "C:\Users\Admin\piolo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\piolo.exe

    Filesize

    248KB

    MD5

    4af3e09c31edec2225ecf8dae4e220c4

    SHA1

    707678843927d1c1a019da128eb4dc2f3e825014

    SHA256

    8cfb84bf9a146aefe1b7d3355e91ee7bf0f239783712b0b02f01f04b2a23a50b

    SHA512

    f9c9eee13cfa1af376ef2141c44dc9bc898cde8abb8c4ccc2b6ba48356085028859263237a7bee809abd282ea09c05b3900d6b43ac033e035bc80cb7d0680a7b