Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 14:11

General

  • Target

    b3c7d4249a0457d93d630b42d6a8759f_JaffaCakes118.exe

  • Size

    240KB

  • MD5

    b3c7d4249a0457d93d630b42d6a8759f

  • SHA1

    03be962c3456d3cb15b2298b58f0c5a6a226a92a

  • SHA256

    7eb865faae0f7623ca9a9032ff8a5b8a57768c9d06cd30f5fbefdecb26561a88

  • SHA512

    0972e4ccd514958fa4fd323b93f741fe45b4da87480964fdad831d0466287e58722e5c59cd50d8a1da7fd1f1b3bf836b12bf2e562994cee7dd6e1d4e70ceda33

  • SSDEEP

    6144:Aw3dwqsNTNEXGlQR58EqxF6snji81RUinKq3aEESliDy:AqdQKjeaEEp

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3c7d4249a0457d93d630b42d6a8759f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b3c7d4249a0457d93d630b42d6a8759f_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\teook.exe
      "C:\Users\Admin\teook.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\teook.exe

    Filesize

    240KB

    MD5

    bc5cc513041cc35ff2cba6385652f710

    SHA1

    d4c14dee62bd97dae78f7fe17723d6af470266bc

    SHA256

    c78fcad350e938998617b39d6bcd279be47106c7c30ec792d905c0acb6123bb9

    SHA512

    06b6025ae6a76bdc0762efc1c091158b67a2a61b6c9b76d68d12ddc6194ecdfdf461eef79bc701ed694bdb219a1c38a347a0b1dcf95d529819fa2071448b8867