Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 22:43

General

  • Target

    b556a5271f699eba25e82339b73097ee_JaffaCakes118.exe

  • Size

    152KB

  • MD5

    b556a5271f699eba25e82339b73097ee

  • SHA1

    474ff433afcc1661b548c8d9620bbc3153303355

  • SHA256

    5c96f74eb578aff825307c79e84181ed4c74c5ff562f0b6a70b8c76f06d892f5

  • SHA512

    8505726d1782c4d320779f5f7dd609772cacc6a068f2817829e243d7a9502687a92a242776436ce889e2bcff864761e06ec51bc8c2612796d4479bdb7cb930a6

  • SSDEEP

    3072:V5EGAHCzwrCaHHvhtbz0wXtV2eZDEUXni7fo7KSif8xWM33r3k1jTCZU4oQZiEmg:sGGCzwrCW/0AHa8nuo7KSif8xWM33r3H

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b556a5271f699eba25e82339b73097ee_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b556a5271f699eba25e82339b73097ee_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\geoopow.exe
      "C:\Users\Admin\geoopow.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\geoopow.exe

    Filesize

    152KB

    MD5

    61075aa5894d143c265fdd20adcb5288

    SHA1

    6b2dcefb1dfc40d577774f51775725cb07366bf6

    SHA256

    9a257bd5218b1d41672a51783d3bef6559d980155b784a9f036c5a829a234bc7

    SHA512

    7d11b0cde9031632673c7c055afa01b82db6a87f62972dbab7462d5203269db99162dce1307e230b90839d4d4fae37c713d6328fb93f809ac3cd583776115517