Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/07/2024, 04:57

General

  • Target

    4049c789dc765cef641fcb44e8e5a8fb_JaffaCakes118.exe

  • Size

    236KB

  • MD5

    4049c789dc765cef641fcb44e8e5a8fb

  • SHA1

    531292c6162cf651e8e507df37ccde030ae99263

  • SHA256

    98a50b379d878ae0f9df4bf74e38f3aae7e28aaea8aa7a3476bb87f5ba369f7c

  • SHA512

    d8f0eccf833a7cee70e5f2979d96509a40194102ef63873adb4b2e2f98fce72311b698d3c65bfa26ea8ce3c5d287a3a168cc8b0ce970f6e9364f19f13858f95a

  • SSDEEP

    6144:P5i0k3vnS/Gi+YdQEp9szHR8uBAoW0EOIp5JO:s0k3vnS/Gi+YdQEp9szHR8uBAo/Sg

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4049c789dc765cef641fcb44e8e5a8fb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4049c789dc765cef641fcb44e8e5a8fb_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Users\Admin\rienuu.exe
      "C:\Users\Admin\rienuu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\rienuu.exe

    Filesize

    236KB

    MD5

    57f41503248c54bfc65dd90de6b484bf

    SHA1

    aabe621734a1cdc9e6e04bf8c542f6da3e7a1298

    SHA256

    a93dec1f82be82d185eea767136a89b1ec277cc014fb10b86ca3ac844febffcd

    SHA512

    9952109cbcc92526238dd437951f80f2dba9b1883dd06bd9a4a7b18edd605cfb707e3ba167f8e85e87713c6ebb33627753f1a2b10df64856623b8383fab1070e