Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 17:56

General

  • Target

    a7a45f3c66b4330b7feb83f3d9d7df40_JaffaCakes118.exe

  • Size

    200KB

  • MD5

    a7a45f3c66b4330b7feb83f3d9d7df40

  • SHA1

    d632a08fa02b850a7179c3e09f9b3244f0298189

  • SHA256

    6ba6397691d6fc2ac9344e9d595775db54614fd4dbf321d8f40c66af5d043668

  • SHA512

    b4fad654428e504e384f80754f9699337ffed5c0ddb17ef564949e4aed3007394a9b2d3acf1dd1e2989dcc02eef20830c155de6c5525c7c3eabb8b889f576f46

  • SSDEEP

    3072:OCITo/0Yxq0tQ9nLHbB9WPliBs2HWWEakGJm9qH:OCdI4QxL7B9WPli+yWWEazr

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7a45f3c66b4330b7feb83f3d9d7df40_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a7a45f3c66b4330b7feb83f3d9d7df40_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\zaaah.exe
      "C:\Users\Admin\zaaah.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zaaah.exe

    Filesize

    200KB

    MD5

    59a38d1cd920a953c7c1a5afdcfdac72

    SHA1

    0118e19a036b16356423f14b3211e32d8104cb0b

    SHA256

    fb348b491e0f2c1c99a4b83db4dd88f322c4763e9ee47ce2d27fa5f21098895b

    SHA512

    a46d4245464656723712d5e2f10a430853dbf9b9d8238679973e5a079fd30ceb167b3df43cb427cb5fbc931c2763f57471c444eda13189bcf234999e2bc5b6b1