Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-07-2024 12:35

General

  • Target

    5bf79f11626abdcd497b19f0c85791a9_JaffaCakes118.exe

  • Size

    208KB

  • MD5

    5bf79f11626abdcd497b19f0c85791a9

  • SHA1

    5ddd045e4af8be9570c82346d9cf1c57479da099

  • SHA256

    c5edfb23ede975fd9e4dd53c6be133a4850f423e7134ab0e500a20452905a4b0

  • SHA512

    9cd31d6ecec409d28fb99cc10e3f9189f380e7d37a2b079c4333f29a147033ea062ef423f6a95c76dba58d94093e6ec85bd40bb4bcfc0cefc2a2f301e99ab341

  • SSDEEP

    3072:jDMM1y2DD979aAqvxpDWDhQx9AhHp8NeqxEN1yy8p+uxb/:j5yeoA8pDqQx9AhJSRxiJ8jt/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bf79f11626abdcd497b19f0c85791a9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5bf79f11626abdcd497b19f0c85791a9_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Users\Admin\twxoiy.exe
      "C:\Users\Admin\twxoiy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\twxoiy.exe

    Filesize

    208KB

    MD5

    94216a1c2947361c510b42720f6e816b

    SHA1

    7621b6ae45b55a3d92a38a4f38052bd5eb385191

    SHA256

    2a511c7db15d860c3c4276da0f20d4b5ca4d58d7db946ded1189736fab259820

    SHA512

    d1b50beadb46a38125f05e4c52d2489ede819e5dfbb40ff69115d66e2b2781f70f191b8fab35e8a9ccacae77208cbe1e27ef17a72c4c8e66792e16100d117b6c