Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 08:00

General

  • Target

    6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe

  • Size

    148KB

  • MD5

    6267d5e81ea5d3350baa32ce30d12b21

  • SHA1

    c23ae7cecbed53b85f9693b6eae94630f96461e9

  • SHA256

    d4a91f2a077139865a7f1a47547017858720bcc3c1c34f02fffa0ebd86e20942

  • SHA512

    bc6483d78e53bf95738ed3d91cd6d00539cd7736f3fc29974a843a3e3da49d1f5493cb7ff908a69d9eb4f67a09e36474e62a45c0297534d10b1057a2230b1265

  • SSDEEP

    3072:gdo+ogRs59j/pvkqBBac+RAGq1bg7Yfgst6OzOS79pgRZkhQJAOAZ4oQZiECH:OoFbj/pvkqBBac+RAGq1bZHtrzOS77k6

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Users\Admin\qoopu.exe
      "C:\Users\Admin\qoopu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2952

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\qoopu.exe

          Filesize

          148KB

          MD5

          cb0b8271a1c86510664bc77579fc14d5

          SHA1

          d6b268ec403e7e982c51f8b81131dd89e6284738

          SHA256

          2fd76f0a05770ec4c3f9372416d42f046a7f57d08769d063b1fcbda3ff01a883

          SHA512

          7b65f4c2adde2f88f3c8a80b571edff9e883e41163febfa8d201ab0a2b52c3b77d985eb7ccfe626f0ef19fc584ceb1d42bc7625b50a679f4b34a68894bdaef34