Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 00:56

General

  • Target

    b5bac5e47e7f3bdf3b55f4a1e732cb6a_JaffaCakes118.exe

  • Size

    156KB

  • MD5

    b5bac5e47e7f3bdf3b55f4a1e732cb6a

  • SHA1

    2970391bde8008f600045c868651ca51fdce7c9b

  • SHA256

    f3a809a90786792c9ac24e5d73496631b94fcb230959fd3fba844e76b71e5dbb

  • SHA512

    3737df55f9e0226bfe94419413ee0a75273c6afdd1fe70d44847538eb185c6d07002a72cef78274d1e890ffb8fdbbbda8f6e9c054e49a20659f757170622e560

  • SSDEEP

    3072:fAtcTATe0pBI1xkaGU0vBpT8k/QvbawuxtUYqBd5hAmamQAMHfhRvuWxx0+pE5j4:fyc4e0pBI1xkaH0vBpT8kltDr8L5DMHP

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5bac5e47e7f3bdf3b55f4a1e732cb6a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b5bac5e47e7f3bdf3b55f4a1e732cb6a_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\leekauc.exe
      "C:\Users\Admin\leekauc.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\leekauc.exe

    Filesize

    156KB

    MD5

    2f05806b4d1448ca483a37ba3c941fc4

    SHA1

    ec839ddab82e2e607372a97da4fbcabf39e4a976

    SHA256

    144ba808c34f64fbc87d41ff484bc9841bc08af2eb1d4477829d41f9e5ba7772

    SHA512

    446e6aa584beba043c00396ea24125cf094150798aab70d64f72fadf857d9de2f4ea0303d476960ec911456091f3ec7e8d7eeb29f3fec0624d4b56c6e786dd0a