Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-08-2024 19:05

General

  • Target

    ac34d51acc10351d3b355865fcbda834_JaffaCakes118.exe

  • Size

    172KB

  • MD5

    ac34d51acc10351d3b355865fcbda834

  • SHA1

    0ceceb9ec9dc619eb5d6101d2615e69accb0d5b1

  • SHA256

    2a5983093e2806ef38e1d3053b70b930c3aadd59949a55db595c1f3057524992

  • SHA512

    d3f113cfa9c6998fa043db17d368f8e9aad3061528709e733263af6b2a45ac2f7b89073e2fe9dcc36438dee049655f9768ba5f1e2ec8156a883de0f47d73a03f

  • SSDEEP

    3072:fg3QXXeRgw3tiKnvmb7/D26nYNpnHzqTT8RUFwjkKvLg3dvCgIHzmWZAlGbBmiBI:IAXXeR1UKnvmb7/D26nSnTqTT8RUFwjS

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac34d51acc10351d3b355865fcbda834_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ac34d51acc10351d3b355865fcbda834_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Users\Admin\soawaf.exe
      "C:\Users\Admin\soawaf.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\soawaf.exe

    Filesize

    172KB

    MD5

    de6818832c9383fff90a408f24c9a00c

    SHA1

    3248f8b448e907b4eefd21ce4f2944a4a329e2ca

    SHA256

    86cfeebf5518f6a9819dd40aa74326e506e0e6c660beefd0d65f68dc4a773f47

    SHA512

    9913df95b3830ab0b491f2a3f9d81ab6f48e98cccd476ac7d01aa14436d8274e582a660e113ea5231ff8e5fa491cb71a4325aaf64d6bd742e1d13956010682d2