Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 11:29

General

  • Target

    95eaaa6063cf066550dafa5d313bda22_JaffaCakes118.exe

  • Size

    176KB

  • MD5

    95eaaa6063cf066550dafa5d313bda22

  • SHA1

    db4a51e6683076e310397eff13a612bad5d58b7f

  • SHA256

    e2fda6d96ce118658d5086326d4433e9537acf03b3aa14fd0fa35484041380c4

  • SHA512

    566d8eb7be325fb266858bb61f0ac7de1b573f11a14830970baa54fb20eb8ab6d2b5767838012c888206ce68d67fc45d82b3ba2828e3e1b9b9b5e496a0ba0110

  • SSDEEP

    3072:R504IcfpHlp1D2KcwjIU2aTObcpT/pHkEAbN/yK/fObT/bGiCV/COqoSQ/iBuAZZ:L04PfpHlp1KKcwjIDaTObcZ/pHkMK/f4

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95eaaa6063cf066550dafa5d313bda22_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\95eaaa6063cf066550dafa5d313bda22_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Users\Admin\bcpeot.exe
      "C:\Users\Admin\bcpeot.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\bcpeot.exe

    Filesize

    176KB

    MD5

    cb14620cbf464de43e03d0fd77053274

    SHA1

    71dc6df40e6669cb301c707d1521d00b8269dad9

    SHA256

    a6ef37b191d5b8692cfcf4d81141f607d9c626f15bd7b46a523dd35fa4f405ee

    SHA512

    17fb284c42006bd9cae099f6d9f38c518e83a2001802529a290914b0af86cc90a0ed57b4bbb503097b99326857ab170e4cd3963131132b0b1f3dcde55b38efb1