Analysis

  • max time kernel
    135s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-08-2024 16:38

General

  • Target

    9f255a5fd8e9cbb1e8c2b1c88d436665_JaffaCakes118.exe

  • Size

    386KB

  • MD5

    9f255a5fd8e9cbb1e8c2b1c88d436665

  • SHA1

    b1583d74bd8eba91a43de585e4c13fa142441efc

  • SHA256

    25a7825a3bb8e1777dcaec1627d0030492091f053d77d660aa026a7e80b0ce0f

  • SHA512

    fa77764dcffabf9ebd295ddb741de5de8c1d899f20943579eff8c0aab8d3f204a5835e993271b847335ee6188db5bc6e3504c1e9b3b5f5f0c8d6c7aead25e27a

  • SSDEEP

    6144:uptmZ62NlgsWxhFkZpXIGWvDwYNSZZa2TjaFJ7eIbH661cdfFI6u:StmLb2hFko5NS3LTk7pvchu

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f255a5fd8e9cbb1e8c2b1c88d436665_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9f255a5fd8e9cbb1e8c2b1c88d436665_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
        3⤵
          PID:2560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt

      Filesize

      84B

      MD5

      3a0c056fba2bbf42f9666d4fc3c900b3

      SHA1

      e56d46d5969470e54228bcc9a6eb4c562aeec6a0

      SHA256

      360c40d068ab4cda089db1fce7f4225bb915810b21bb9bf9e51b1beb49edfda5

      SHA512

      8da0bac2aaea0f1a6ac4aebe9c252de96289d3f063a649df2ee774cbaeb961fa4163f0992f26fb620a1758d6d4bd88da20c90ee261f004c71e4a3b8e45f3e689

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe

      Filesize

      386KB

      MD5

      9f255a5fd8e9cbb1e8c2b1c88d436665

      SHA1

      b1583d74bd8eba91a43de585e4c13fa142441efc

      SHA256

      25a7825a3bb8e1777dcaec1627d0030492091f053d77d660aa026a7e80b0ce0f

      SHA512

      fa77764dcffabf9ebd295ddb741de5de8c1d899f20943579eff8c0aab8d3f204a5835e993271b847335ee6188db5bc6e3504c1e9b3b5f5f0c8d6c7aead25e27a

    • memory/3016-15-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

      Filesize

      9.6MB

    • memory/3016-17-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

      Filesize

      9.6MB

    • memory/3016-18-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

      Filesize

      9.6MB

    • memory/3016-21-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

      Filesize

      9.6MB

    • memory/3632-0-0x00007FF9CB1E5000-0x00007FF9CB1E6000-memory.dmp

      Filesize

      4KB

    • memory/3632-1-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

      Filesize

      9.6MB

    • memory/3632-2-0x000000001BE10000-0x000000001BEB6000-memory.dmp

      Filesize

      664KB

    • memory/3632-3-0x0000000001420000-0x0000000001432000-memory.dmp

      Filesize

      72KB

    • memory/3632-6-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

      Filesize

      9.6MB

    • memory/3632-16-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

      Filesize

      9.6MB