Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 11:06

General

  • Target

    62fc5337d0d7302425a2df049be40e66_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    62fc5337d0d7302425a2df049be40e66

  • SHA1

    42ae30a6cdbdd028c157d29079ae92a1c16d0f7b

  • SHA256

    604e78d3163fc382a04d3f91a3faa0eabd2b4fedb15d392dd7558837ee118f95

  • SHA512

    9ff6b6a370ba75219e5b087eab746ae69a120d4091791a551b58ab8dfc474e0d2b12025fe37d6a1c8c11ee99e2e92f4b6576057ae577e859e5c0dfa232b28445

  • SSDEEP

    1536:7PtGK82NTzwTMGAc4ohrPXo+73Rez8b0Sy2NIjnZMd:9wGurPX7C2Cned

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62fc5337d0d7302425a2df049be40e66_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\62fc5337d0d7302425a2df049be40e66_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Users\Admin\diufub.exe
      "C:\Users\Admin\diufub.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\diufub.exe

    Filesize

    100KB

    MD5

    22a24f5559bcdddd85dd35ae76078c08

    SHA1

    6dcf690939eebf8ac1f9b895048062894020e3d4

    SHA256

    a4c464a9ef6550b01415ec157c7c23c1c9cec96231a0c6ff8c864e1f3804f1e1

    SHA512

    ab44b6d20bd199ddb6e6d5ca7381cc77a76ca6b0ad17866d7ab5cdab51f80c32f29ec302f6f1419d3a9d389ce4df979b259ece5ac10bf9467c9c69f2caee1ac4