Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-07-2024 13:04

General

  • Target

    49e5f1c876838d2cb38b8d2e2455f2b7_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    49e5f1c876838d2cb38b8d2e2455f2b7

  • SHA1

    88904bc83529c1c2facb4c34fc09ecd1d0e462ba

  • SHA256

    d948645ac8278216d4f6158dab5051a9c97721f67cfbb160731c40746ec6da6c

  • SHA512

    6fe42a2dcffb53637058a6ff6243f348b6134d583793b674bae300aae7b8636ba69b39a5a54269282483376826f0fc8ae875703cef96ff6b36e6432336b21ab5

  • SSDEEP

    1536:no2rSpy8tXG06YpqdXTsYJ/F+FBFIFGFYF7DUZxTZhza:rSs0G0mZM+

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49e5f1c876838d2cb38b8d2e2455f2b7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\49e5f1c876838d2cb38b8d2e2455f2b7_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Users\Admin\miuub.exe
      "C:\Users\Admin\miuub.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\miuub.exe

    Filesize

    88KB

    MD5

    dcfc24bf4ebc27a6fa6cd0a16707776c

    SHA1

    04ed965ed7c0d8077f973c1a3ad1758ff98d481a

    SHA256

    4db667dd3f65240cc279fafc3e1d87c161ec6be2518883473d08f0e016858cd7

    SHA512

    bea3aa4fd84b94bff905ef85ceea44ebe191fe450016d1e9a295f53187e1991f412f5c6e080ce8556b390f11cbd897e2a11cf4c0db0347734a4f1566d586fc65