Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 17:06

General

  • Target

    abd9b44454eca42ecc1ff08cbcaf58ef_JaffaCakes118.exe

  • Size

    140KB

  • MD5

    abd9b44454eca42ecc1ff08cbcaf58ef

  • SHA1

    d5a2e61b6fcd92cd7e3482bbbc1f0ba8f67f08c7

  • SHA256

    32932b071892f891d3f349228426ea25b100e2a1d61f955235e14e767f51c995

  • SHA512

    eaf8fd94f5976d761a9631e857c9917ef03e35c92eac13b4bc71a9732e6484ea3d6bcfc40c7deb029670bff5bfb0e7be29fa150cdc8f6dcf5d4bfb423b7ed598

  • SSDEEP

    3072:Pl2rglhJmkD73mQtFDPB1P85XvbM7h8bdaqmRIxqeHHNMViRzOW:Psr6hJ/72QtFDPB1P85Xvw7h8boqfqeX

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abd9b44454eca42ecc1ff08cbcaf58ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\abd9b44454eca42ecc1ff08cbcaf58ef_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\mgvuf.exe
      "C:\Users\Admin\mgvuf.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\mgvuf.exe

    Filesize

    140KB

    MD5

    c32c56d1491b4178b3132c1fe6555109

    SHA1

    5d3c30afab3462dd0fba5bd3ba09e751936563ac

    SHA256

    0d292b1fd74604837f47f7ffdf6ea3b6d9ca2ee33059fe62c1d91336f25f5fdf

    SHA512

    53e8f91c82d10e133ffda26099fcc854caa4748afba26e5dcc4672cdd4a94f776a401bd457dc4e25bf6a3a0afce9ed41e7b277076eef0eb892b30dfa5308085a