Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 00:11

General

  • Target

    b596f355cf098891facb16c024176633_JaffaCakes118.exe

  • Size

    116KB

  • MD5

    b596f355cf098891facb16c024176633

  • SHA1

    78f789d6305f4377655ae99fe96d2243ce1ec545

  • SHA256

    80a3093ead3869daf97ab368193d0bcc048bc5cb174894b242fa49a86ffd06cd

  • SHA512

    ea52addbc855334def03199cb1dc3b6b1902fbb67b9ea0b26edb642161f19462244ef578c163abced6ccd559ef2b1e3ced4db1e25f2633350723a50e440d63fc

  • SSDEEP

    1536:s+pxoUL++W/SK8Kw6KBOIW4Z8HO1Zwt0f4HeDUEdMOPy9sbgNLwo7JaSi:PpRi+WrfIr1ZNDUEdawQU

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b596f355cf098891facb16c024176633_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b596f355cf098891facb16c024176633_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3416
    • C:\Users\Admin\heexie.exe
      "C:\Users\Admin\heexie.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\heexie.exe

    Filesize

    116KB

    MD5

    d61e8598ca3530190f9e7b7237b6c2b0

    SHA1

    5d43077ab672ebfba6898b3cbc3a5fa0d742022d

    SHA256

    690ee265191309f0216f1c11654db97e1f2b38833648d2be17359f335607f366

    SHA512

    5378cf12b9b76867178c6ddfaae2aaf3c391feb179cd0d066f03d02b05cddf1f43e9e9dd7d8b822156de4416e0de84c2c9e502dac4ebc1983c71ca84e131c4da