Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 15:37

General

  • Target

    afce39fc95e0c21846a96202c99b3662_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    afce39fc95e0c21846a96202c99b3662

  • SHA1

    94c496612ca2c10f0b1e9fb71ae2192599cd19c9

  • SHA256

    8354220de9015fb535e01a03467999fe02c4596df21eb72690d2fcd7bdb3ade2

  • SHA512

    1e8dda30ec957b575807cfd5fec4b803acf3a8d2daded4a2ff488dfa42f5d4e9bb0c2f0055056ba78236dc163b262a6b6ad0c2f0ec1f58d9ee107c2caa2b51c5

  • SSDEEP

    1536:si1Zyiu8FIIKZrDJxtJu9uRiIelOQ212IE6jDSUaWpsE4BjP4YTysOkt5ycQg:zZy8Q89uRvsW6EqysOyLX

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afce39fc95e0c21846a96202c99b3662_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\afce39fc95e0c21846a96202c99b3662_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3504
    • C:\Users\Admin\roajox.exe
      "C:\Users\Admin\roajox.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\roajox.exe

    Filesize

    132KB

    MD5

    e680a1bc6e208ae3ac81434641fce9b5

    SHA1

    f8c83038756a8b70d49e5c2311536cef17310bc8

    SHA256

    2ca2c4e37cddd085f0997738b85a1262e21300c3e9935560553b2f13c9463195

    SHA512

    477d80e080d714b9612725ccb10b9f66838b909c57d8925d4e38e914c055d73117faa7f34b279770f9a79fd374936a2ccc68ef8328221930191602211f115429