Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 18:30

General

  • Target

    872d42627790aa148ddcb5f0fbc330d2_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    872d42627790aa148ddcb5f0fbc330d2

  • SHA1

    20ed57db2db30355c46a60d6b64051b2a1d9fc61

  • SHA256

    176c6044ed61938890e64a106d74301cbe85f20318b96450651d85539a5a65b7

  • SHA512

    ba4f9a5a70ade8e2eff7028d50ee303c213341238cdbfb07c84459100918addf69cf20bca05e7947c6e8485f6bb3227daf4dab9b2a6f5f4d7ffca90f39f5b165

  • SSDEEP

    1536:0nb8EFY/67NxkiQixA+alh98r8Y9USv1jyPwo7JaS1:2b8EFY/67gjH8ri8iwQL

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\872d42627790aa148ddcb5f0fbc330d2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\872d42627790aa148ddcb5f0fbc330d2_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Users\Admin\xeuumo.exe
      "C:\Users\Admin\xeuumo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xeuumo.exe

    Filesize

    124KB

    MD5

    864414410d773bfd4e0d110fc6ebe8c5

    SHA1

    29efaf08fb20311dab2fc6e956b656bae158fe0b

    SHA256

    ce162d5324897601370a171388a8d9135cb50948dbfb7344588b7bd07a5fe83f

    SHA512

    46cf8d9abcae61e9378a4044091d3c5b99aa8c05f7d93620c5d13430a540f70940b53f3619cfcf3c96be789b12b11e5322a0551e96119de1c474230d13f83ff2