Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 17:53

General

  • Target

    751a17e051ba9b6e8171ecfb65e5b2c8_JaffaCakes118.exe

  • Size

    96KB

  • MD5

    751a17e051ba9b6e8171ecfb65e5b2c8

  • SHA1

    b17f4e862dfdfe92e224708169c2de803c8c3bb7

  • SHA256

    de9fe23a7a6b6b7b8872c2b7152de1d0b62f09a64193f1723a8f4d4ddacb3982

  • SHA512

    87056fb399b6e7a6b19cba54a0afcfbe4f2c78b4d94f0c42b4f1c0c4b3444fe34af3a3f7b9302992ba46cb2cdec1361d5dbf5b80f409d30a878808c053287f9d

  • SSDEEP

    1536:+nQBHlf6cO/hq8kGulSc16l6u+NMMl/KlYv1Tq5ThFKNIj/:hmhqNlu8CFFKC/

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\751a17e051ba9b6e8171ecfb65e5b2c8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\751a17e051ba9b6e8171ecfb65e5b2c8_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Users\Admin\gomex.exe
      "C:\Users\Admin\gomex.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gomex.exe

    Filesize

    96KB

    MD5

    7a5f3b1a543f3e5e08a973675e01a9ec

    SHA1

    4e1e48f648cd40fb8f85ee56f4ea21da4f64d889

    SHA256

    a0f6016d26122138a08083def698eb4b69e1409ce1deba8113793b9bc47e1c2b

    SHA512

    8b5e096b85e04acb7fa641c16a321bbbe7c93286a90f38b536636583ea25a61c770b8a19b37e4543a58fb19ea2087b8f79e90991b848ecb041983caa8d12aace