Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/07/2024, 12:02

General

  • Target

    4195547beea02c2a00251c1186c4663b_JaffaCakes118.exe

  • Size

    276KB

  • MD5

    4195547beea02c2a00251c1186c4663b

  • SHA1

    2b8c99a96aa22a244eb57f162713ce6790649ee2

  • SHA256

    c643352c5531fd4fd84b55ec6b0185c56c97532f857d9395612de02482f35832

  • SHA512

    a137e5395212873b8bb808ab44f32c0aad27e31a599554c4c40e49ae2acc3c18f981cf37478725bf2076b1edf709732b4b0e4550d59b45edf99d78d908b97167

  • SSDEEP

    6144:tZNqhRQaX/m7bfTWaxAQ9aLb+Kf6+2/MKsjh9Bqas5Ti3q/Vlg1:trqhRQaX/m7bfTWaVKf52/MKsjh90aQa

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4195547beea02c2a00251c1186c4663b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4195547beea02c2a00251c1186c4663b_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\seeme.exe
      "C:\Users\Admin\seeme.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\seeme.exe

    Filesize

    276KB

    MD5

    df8df1e3e956d35baa8e2bf1db6b9828

    SHA1

    75c5c09486104be637004bce621761849247e148

    SHA256

    01d6fb38d975d4cd275fd4f1111a054e426955c2a934adcb0808aac75629233b

    SHA512

    1ca79429afe8d709f6fa6fc2a24d8a9f953555cb780988d2dedba46ae8dc2af9d5db87f549b8f7952d9f622db98a8644357dda05e3d6ee8058aadd8dbd241077