Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 10:38

General

  • Target

    a2361a9329f81424716e856ce1c475d3_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    a2361a9329f81424716e856ce1c475d3

  • SHA1

    015923b911ac620c15602866b5f594ad31bb167c

  • SHA256

    e0869bee9d2a4faad3d2f5b9505302b0341a8f558f938318b307091ca63bffd1

  • SHA512

    36c4e46c121f3eca2766bfbe7b37bbae8cdcc5d237c06c1624763132a5b10bd836c344b0c53a0a79b429ac999cde9ce25ec4bc4fc366c6e408fb14b37174979b

  • SSDEEP

    1536:4JtGh82NTzwjaMGAc4ohrPXo+73Rez8b0SyKNIjnZrJ:twZurPX7CKCnlJ

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2361a9329f81424716e856ce1c475d3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a2361a9329f81424716e856ce1c475d3_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\nauev.exe
      "C:\Users\Admin\nauev.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\nauev.exe

    Filesize

    100KB

    MD5

    a3f5856e778d5913ceea3cb2177aa903

    SHA1

    512af5fa35a71a5790c13638e7df6345e1e7d0b2

    SHA256

    a5805c0653374a1a6ff0e835bf5f94b851ab3a62fee7e3a3e94bb7ce210e04aa

    SHA512

    18a553ac3fb8bcf6e7b4ca2ec22daba0a0c040dac0fc00901305832bff65d0b0aeae562f795dbe32d15b3d453f72d30e7c76328ec86588f90dcaa1311b0211b6