Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 00:36

General

  • Target

    7665cce064a387a068b34effe7798d0e_JaffaCakes118.exe

  • Size

    200KB

  • MD5

    7665cce064a387a068b34effe7798d0e

  • SHA1

    7bedc638c8982cd1304b0d6857997b7015dcb9a1

  • SHA256

    8cae7d5f3ec2c99539b4876c1e9ff3080dd3ff26a91abdd529f6f6929c916f3b

  • SHA512

    8064b77c750173f75ff9864349af1f09a6d045e9d52924fa20fe56e7f6dde174caaee372a4497c9abbf585f8ec89b0336914929f85991ecf0506417c65f1323e

  • SSDEEP

    3072:ICgTo/0YxY0tQ9nLHbB9WPliBs2HWWEakGJm9sH:ICly4QxL7B9WPli+yWWEazp

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7665cce064a387a068b34effe7798d0e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7665cce064a387a068b34effe7798d0e_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\wookuu.exe
      "C:\Users\Admin\wookuu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3012

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\wookuu.exe

          Filesize

          200KB

          MD5

          dd87497f88e7593fe4acab1d8ddc9979

          SHA1

          0c98d39dad09e6b704a57d7776afad75022cb19e

          SHA256

          a48f4bb8cd500f2c185da28dd9894b6420ea19a95b56e846bb80bd9999ab8a5b

          SHA512

          5be0cd62a0d1b1aa83fabed160ee0dd77902083f90f95adaa9f14dbcb06ab8b14df3fe425f94f67e1e11ac49226947a2348830263f77f8a1a92ee987ad4b5fc8