Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 11:12

General

  • Target

    5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe

  • Size

    156KB

  • MD5

    5bb1b51f497b8ab025bdb4d0305d177d

  • SHA1

    cbb6d975e6c5c2513e04eb3b249b24043a101927

  • SHA256

    c4b32f6fc9b8f78d79b00cd40efada235d08ff7077fb4a183c11772b5daf36b9

  • SHA512

    683a884ea95df5ad43a09cf786cfbe0c86e24843fb60a64370e329e1ca7325a6d7e4e31c6d6a2ef08c0ceb08572d284a2705f3c8f060e0fd82e0764e25504f33

  • SSDEEP

    3072:xANPhL3YsZtSxch3Z1C5GbWyleXkbxy6cg48Af4oQZiEh3:+PhcsZ5b1OGbU0NByhWL

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Users\Admin\geujouw.exe
      "C:\Users\Admin\geujouw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\geujouw.exe

    Filesize

    156KB

    MD5

    b8f884ef9b186b692a4de390fa4dc02c

    SHA1

    7781e61c2ab5e85c331704d1722db43ee3b3a932

    SHA256

    b525a1f1a2345a57219fef47f5c265008a9b9cb3485f8e52fdf993d62342e868

    SHA512

    05601d77f33e1b9995d75682580bfbfbc1c6d63eb5da3f6a4dd0f4ad26cbe01e22de0165200fb951559503bdb9a2a0711f27b42b8809859081504c6476b5a194