Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 23:42

General

  • Target

    a49d059bfa8061654035cf67ba09994a_JaffaCakes118.exe

  • Size

    260KB

  • MD5

    a49d059bfa8061654035cf67ba09994a

  • SHA1

    6bd5de3444b0e3ac696b6fe2d6f00ddff9ade3de

  • SHA256

    c26e8367735bd562116320446c2dc3e09bf41cd6e98608c9a3edb97bbae72cc4

  • SHA512

    6fd0c10f2ab141ab3ffe13f41b86c7884af3536bdde1fbe1041fe301aaa61ba6b8c5d93a1a60f1d7ec8002033f0d09478c40ff82935a4b40cc4bfecf6961aa8e

  • SSDEEP

    3072:5kpcPIDHQXftsa01SOq1RY4uJr/I5fEKcpGJsXS9e:acPIDd+JleGJ99

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a49d059bfa8061654035cf67ba09994a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a49d059bfa8061654035cf67ba09994a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\vefuk.exe
      "C:\Users\Admin\vefuk.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\vefuk.exe

    Filesize

    260KB

    MD5

    730234e77ca2947243aab4a000aa7de7

    SHA1

    9b055858bb41b9b1ff851ac627467412831668e4

    SHA256

    2cd856264c0eff940f9aea6d734d416d1bb91b88f94c7b37be474cbcdf718e78

    SHA512

    affa6b512fe90a35a633fcd0e2a1cdfc0dccb37cb17cb12294e4f3c61390b2b9264284c343fd403fbf2609312045b2cc86942dc36c76793454665b135d330f8e