Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11-08-2024 21:15

General

  • Target

    8bff69710b20415cadfcfb54b5b66fd6_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    8bff69710b20415cadfcfb54b5b66fd6

  • SHA1

    e56773f6b77ae72a8cf80d1cb4d744146c3e8dd9

  • SHA256

    e261777c92bf4fbe73e896f184af0732bad2d0234014a14ee16e97ebacbc476f

  • SHA512

    59ee248fd5ec4bb49c951408b8bb7ac11642028bea088283c0dc8d36c7391bb1218408f6741206aaa4b48e7ab302882f23c19166f48dee2ad0ef3bd7dd15f487

  • SSDEEP

    3072:ifMyYbtX6RzvyuOi89Sey1AKWZXl7miWmn/Aou:ifMyOtX6RzvyuOQesWbScA

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bff69710b20415cadfcfb54b5b66fd6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8bff69710b20415cadfcfb54b5b66fd6_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\maareal.exe
      "C:\Users\Admin\maareal.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\maareal.exe

    Filesize

    132KB

    MD5

    3251d9a1ce96d72f045226430311dd39

    SHA1

    0cfc393125f06c8a1d2fedac481da9c74519c463

    SHA256

    5a71a7fb485505a1b4b160b47b9e6f94cde140afeb26dbaf6335c0bbdd8dd9db

    SHA512

    86af974df88ad474c700cb214fc77a64b040617a279309b5f04b5266559e82450deba4849d808221bb375be5155564af35e22e8ed8d0f2addecdda16fb148a8f

  • memory/2848-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2848-13-0x0000000002620000-0x0000000002648000-memory.dmp

    Filesize

    160KB

  • memory/2848-19-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2888-15-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2888-20-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB