Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 21:34

General

  • Target

    4b7f6980289eb51a9ee7fba4b3832dd7_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    4b7f6980289eb51a9ee7fba4b3832dd7

  • SHA1

    795d98c80fafc8400f133f5f6cad25c49dade152

  • SHA256

    b259b0bc0f1bbc43a2f9f794d094a0090b56b44dd20a2582c4ea29231829dd6f

  • SHA512

    0c3b52707a54c40525e43b82665c6f237c1146dcbaa8f08e71c22e9f8612797d4907e1e9640e01f43efc5e63f9d5444df06da506773e109e4816182791323496

  • SSDEEP

    1536:tIJ9pVABU0GgAYu0P1kNmwldCMhdu8KWP/nTn8nBP9Ve+NeG0h/x:49peBU0GgA892p

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b7f6980289eb51a9ee7fba4b3832dd7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4b7f6980289eb51a9ee7fba4b3832dd7_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\haofoog.exe
      "C:\Users\Admin\haofoog.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2708

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\haofoog.exe

          Filesize

          124KB

          MD5

          98c960e3c5f8dad2d5d70c372b18189c

          SHA1

          ad7e31c6365e7ed34a545aad8e45e5827667acef

          SHA256

          8b0bb63548f657f05dba626f10541b27ea6dcf102df2bf8fd22894d6c04d090b

          SHA512

          fb789064968b37917687b8cef7622107eac397eea73e69005fbd2582a0eb5b0a4fc6eb42e08ec4de6972fa951d6c84b27bec70c94f7526822e3f98ce757dcff9