Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 17:10

General

  • Target

    74f70896d7219694d577e7f74d0a8570_JaffaCakes118.exe

  • Size

    96KB

  • MD5

    74f70896d7219694d577e7f74d0a8570

  • SHA1

    520605be471365614a648cbeb494b8132dd3358e

  • SHA256

    74251f2f5a56d4fab40ecc1f0220af710b4cffde24be95a5480a6ee54db29b79

  • SHA512

    b3a4eeb0aeb24cb109abaad9eadd2aa467126757d848ead56d5c81083457457b10bdb0ce0ff52749e3284abe56b1fe73d2c3543305d9ccd5d78cf74e290036eb

  • SSDEEP

    1536:BnQBH4f6cO/hH1UkGulSc16l6u+NMMl/KlYv1Tq5ThFfNIjnZI7:MjhH1Flu8CFFfCn27

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74f70896d7219694d577e7f74d0a8570_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\74f70896d7219694d577e7f74d0a8570_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Users\Admin\maeduad.exe
      "C:\Users\Admin\maeduad.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\maeduad.exe

    Filesize

    96KB

    MD5

    a03060457e567e650ad7a363a0d9f55e

    SHA1

    7e90306eff00db54c4d947914eb5c0c752e344ab

    SHA256

    cee6581e4813d8915e98881ad921705b4e17a379db63a93770c897d14a3fc7a1

    SHA512

    3ec37bf3bcf550c3d5d1b86bd2aa8ec1faff8e374d08e3bfba41364de93b634a00857571b805f2321f719c3b41a041c075bad6d31c4c1f7b43fd1eb9b45b068a