Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/07/2024, 05:38

General

  • Target

    4065cdd35d8cc502cb9b0856db009a90_JaffaCakes118.exe

  • Size

    396KB

  • MD5

    4065cdd35d8cc502cb9b0856db009a90

  • SHA1

    c873d262735c1f9925194ee2b22e5dd2a18fccdc

  • SHA256

    d280b0c7d78cdbdc0b8553fe2cfe1556ed680c0e6b4211bb6fb68832b8a3f380

  • SHA512

    96b4782bd496cdb41342407f3d2672d96e5dc3728998f2a50181c0256312fe662648296de00cf843b18573cc8ad1a4754e61da0fe9a042b385e2aa930bc78dbb

  • SSDEEP

    6144:Tjw86qZGlBzFWYSTnEiEcVc2vKx7TCNVq1i4Upx0DKHE2ViGuPizZrpRf3WO/fwW:T886OGTpWYSTnEg/vGgEKHFgGuarpX

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4065cdd35d8cc502cb9b0856db009a90_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4065cdd35d8cc502cb9b0856db009a90_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Users\Admin\tuoal.exe
      "C:\Users\Admin\tuoal.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:756

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\tuoal.exe

          Filesize

          396KB

          MD5

          d05bc289be6f50fe2f287d3736edd59b

          SHA1

          91263121e24f1e0e239e84f5537cb3f7b1e7be01

          SHA256

          bba2f053b7d5fbb84b4873dfe32f6d89d1ccd8fbf27369db566743a269aa27c7

          SHA512

          35228f84fd4fb1b6d61ad828d0b8e623bf89684c60feeacc2eaf91377fb179c3cc0f327a64b56c01bde3d87db56abfd4df3bf754c56e119d908335cc2f21be1b