Analysis

  • max time kernel
    148s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-07-2024 01:35

General

  • Target

    59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe

  • Size

    28KB

  • MD5

    59eecd91d6f5be7d23d9ad5eab1a788a

  • SHA1

    e282855f7f0226e9bc49c726b13e9a8f4dfbc5e3

  • SHA256

    b4eed01f69422039d0f550f9edac95a1687b7a21b01879a0dfbc3b873e61642e

  • SHA512

    d09e11e25aef1d8e477376cd9562e5b25d70c6c036ca6440757b1e93a594eb65e747c295bc9d14ead5f52a58c997f63f8ce22b8da9c50aeb9f67f1ff57f97a7c

  • SSDEEP

    384:g9c/lju92SNHNjctHds2HUWT6VI/x/DryPS:g9kli9jNOtH70/VCLWP

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Dx.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3648
      • C:\Windows\SysWOW64\attrib.exe
        attrib +r +s +h c:\woKuto.exe
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:1272
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v UUcallo /t REG_SZ /d c:\woKuto.exe /f
        3⤵
        • Adds Run key to start application
        PID:4284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Dx.bat

    Filesize

    257B

    MD5

    8d4df9dcbbc211fe2190e4ea64ca433e

    SHA1

    6de1295f3eecdee159b3e98f671dc50aeb060c1b

    SHA256

    932f00d5ba5de4cae838cb52501ccf8be5ccd7eeb0a6e9bafab137303132938a

    SHA512

    099ce4a45f91a32a1f2cc0bd2ffd41a653dd6d883db1d1aff29130ff3785db9a97efd70f44afe35749a6dbe4c391bf9ba3c630fbaa4aee944de7ee6c5d39c8cb

  • C:\woKuto.exe

    Filesize

    28KB

    MD5

    59eecd91d6f5be7d23d9ad5eab1a788a

    SHA1

    e282855f7f0226e9bc49c726b13e9a8f4dfbc5e3

    SHA256

    b4eed01f69422039d0f550f9edac95a1687b7a21b01879a0dfbc3b873e61642e

    SHA512

    d09e11e25aef1d8e477376cd9562e5b25d70c6c036ca6440757b1e93a594eb65e747c295bc9d14ead5f52a58c997f63f8ce22b8da9c50aeb9f67f1ff57f97a7c