Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 02:26

General

  • Target

    ad8c18a3b7012dbe2a0369795ac046ef_JaffaCakes118.exe

  • Size

    248KB

  • MD5

    ad8c18a3b7012dbe2a0369795ac046ef

  • SHA1

    c6cbc0e8786e2f6dfd43777d6da20474d1e4ff1f

  • SHA256

    56df8c1ebf151650c5c7fdfb4e4d6f1f5dfdab201a554105e04efee3468cd778

  • SHA512

    4b391d8ed9c22d9ebbaf3c5cad6a8bcefad1a1bced7505de621dad4836c6aaca85ac260186f65cdd6a30edab504a2d22701a875df5f495bcd9ee52a56191b95f

  • SSDEEP

    1536:hIgu3c9YzemU92lk81NM6MoAUK1bWYxYZ8Q6iwkSQ7A/XZKl/YWAISDKowoz/GH2:Wgu3kqU4lk83AzxYkijDcdeDE

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad8c18a3b7012dbe2a0369795ac046ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ad8c18a3b7012dbe2a0369795ac046ef_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3780
    • C:\Users\Admin\touovan.exe
      "C:\Users\Admin\touovan.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\touovan.exe

    Filesize

    248KB

    MD5

    8fcd4c087d7313e0365676af7a1fd757

    SHA1

    e69a4f363303bf1ac515352cb0ba778e871e23cf

    SHA256

    ff7432e18ce5a63a4bc01da152aefc60b92c839ee60adc4a9d8cb2ac68139e4d

    SHA512

    62267cd4e2bf8bbbb170a1574a0fce34cb27323e4ced2d1b162f53edefae2033cd89dc7623b256cd00f8f1e545418301b1ae441db19599d4b3b33139da0e6fbc

  • memory/2256-33-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2256-38-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/3780-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/3780-37-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB