Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 02:26

General

  • Target

    ad8c18a3b7012dbe2a0369795ac046ef_JaffaCakes118.exe

  • Size

    248KB

  • MD5

    ad8c18a3b7012dbe2a0369795ac046ef

  • SHA1

    c6cbc0e8786e2f6dfd43777d6da20474d1e4ff1f

  • SHA256

    56df8c1ebf151650c5c7fdfb4e4d6f1f5dfdab201a554105e04efee3468cd778

  • SHA512

    4b391d8ed9c22d9ebbaf3c5cad6a8bcefad1a1bced7505de621dad4836c6aaca85ac260186f65cdd6a30edab504a2d22701a875df5f495bcd9ee52a56191b95f

  • SSDEEP

    1536:hIgu3c9YzemU92lk81NM6MoAUK1bWYxYZ8Q6iwkSQ7A/XZKl/YWAISDKowoz/GH2:Wgu3kqU4lk83AzxYkijDcdeDE

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad8c18a3b7012dbe2a0369795ac046ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ad8c18a3b7012dbe2a0369795ac046ef_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\foebel.exe
      "C:\Users\Admin\foebel.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\foebel.exe

    Filesize

    248KB

    MD5

    3dedad4aa8dcd05e5363b04d2ac052eb

    SHA1

    5a64f018ef11c5eab6b55dc4392e4cdbedf8de8a

    SHA256

    4fcb6e1bbbc09b277778ba4a2ad93de7058342b1533f423eccd5e56298a6db12

    SHA512

    0b84af376b28b97d18a1e6af86cb9fa0d5e42039633e3fc9568ee31eb09b5b5cc406b5e1591581a16d4132a9a909fe81cc1e09a11a7a36e9d2aa64ad0a400898

  • memory/2324-21-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2488-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2488-15-0x0000000002D10000-0x0000000002D50000-memory.dmp

    Filesize

    256KB

  • memory/2488-12-0x0000000002D10000-0x0000000002D50000-memory.dmp

    Filesize

    256KB

  • memory/2488-19-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2488-20-0x0000000002D10000-0x0000000002D50000-memory.dmp

    Filesize

    256KB