Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 15:18

General

  • Target

    70224cf8d1eaff523e8d5894562365c0_JaffaCakes118.exe

  • Size

    248KB

  • MD5

    70224cf8d1eaff523e8d5894562365c0

  • SHA1

    e20468699ae11b8074e51ff98435d8baaed9e242

  • SHA256

    fe30588b519e218becab8cf303d6412de9e3cb00699a1d08d989e8dfa508793a

  • SHA512

    1f369999597379ee91b5c208edc07aca771dbf5fecdfa499bb0fc848d0dcf05307fb5051333eb25c879c08e53c4f10de1a425113a252d0089ec25520700e467c

  • SSDEEP

    6144:kD07X6Y0d/RCH3erL/sLAsLPfc/UDgKJ1s4EWqZA7Q/DxoI3sDP4QtNINHKbhFJc:D7Xh0d/RCHOrL/sLAsLP9+AKtF3sDwnG

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70224cf8d1eaff523e8d5894562365c0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\70224cf8d1eaff523e8d5894562365c0_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Users\Admin\xeuvoq.exe
      "C:\Users\Admin\xeuvoq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xeuvoq.exe

    Filesize

    248KB

    MD5

    e201a7317c1a4c01babd930f7a9f404c

    SHA1

    9dd9c7114986c6cba099a5411bd194ec41ee30ee

    SHA256

    1b52eecf3869ea971e419f8c0a7dfae2439a46d0d3dad29588334791156e29a3

    SHA512

    60a0771a0169757361cc1ec485216e4bca773526155351441017a2a228c4d13fcc8d53b58366af16af2fbae17b1c04c32ff381b57b43423dc6daaf5f80d776cf