Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 18:54

General

  • Target

    8b9338ea5a401678b14359802dea2c93_JaffaCakes118.exe

  • Size

    172KB

  • MD5

    8b9338ea5a401678b14359802dea2c93

  • SHA1

    c48c3cced299b414e8c488d1947412c025bd729d

  • SHA256

    5d0e2405505e43050ce8a2aaf02aa2b49806445ba4d531077bb267b74cd6b1df

  • SHA512

    19c25dc18558b24a9082e543bb88ef9219c73022cc57ecf3f8787a2a2e9c794a3f50e9e7e7c908c10f9963cb0594f739cb8ec54fe242601ed3f281db8521c505

  • SSDEEP

    3072:DcLW8Rs/Snven9Dzw57PnCGx6z5l7O5rZ2dBzapNPj4o4eu6gpjJHEZk1fRJu5Tx:DcI/SnGn9Dz07PnFx6H7O5rZ2dBz4NPb

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b9338ea5a401678b14359802dea2c93_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8b9338ea5a401678b14359802dea2c93_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Users\Admin\pouxu.exe
      "C:\Users\Admin\pouxu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\pouxu.exe

    Filesize

    172KB

    MD5

    48a5b28561b46b207575a64516f5c1a1

    SHA1

    55bc9e3f2655fb67925b5aabc6383c848f833fe4

    SHA256

    8f6b089ae24d20fc87583ca26d37d1cf3266aeadd898438a9a9447ccd307c544

    SHA512

    25905d5adecaa670779721ae6006d6a08e3d586b1d07d9c5a3d3e26b973de5056386d81e7dd9b88c6580bf0ad25fdce4703b914e1c411c59f5d36d59bc4f0891