Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 03:26

General

  • Target

    ba2cd5fc940f8212c788ed3a959db2a0_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    ba2cd5fc940f8212c788ed3a959db2a0

  • SHA1

    ae300eb4225fd1abb1552fceb7d3eab3c476bac8

  • SHA256

    8f3cf1cca75da6c72e5e2d10d9a495f828d8c4313630157a659bc77811743f3b

  • SHA512

    e8510bfc523019cbecc331e8c91dec55cab1a3cd6592ce5b29ac50f478ea68bc27176906958e8edcf5a1a1921be6b8bdef92a661a4cd344a7f2a12907fb6804b

  • SSDEEP

    3072:3wBJIch+RH5UL1iUG3KgKLKRKoVqR5VxerayK/fObT/bGicFgvXb6jGJLX:3wBJdcRZSgKgKLKRKoVqRTxEpK/fObTD

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba2cd5fc940f8212c788ed3a959db2a0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ba2cd5fc940f8212c788ed3a959db2a0_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Users\Admin\raazo.exe
      "C:\Users\Admin\raazo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\raazo.exe

    Filesize

    192KB

    MD5

    1649d811366f91149e23c917b0c36b97

    SHA1

    4c64e8408c9f4ae216be4ae72b44096ae9dd3332

    SHA256

    e6fd69fb596b580437e7718ce63de9de53c0bc9687e2835e1ca13673f184d38b

    SHA512

    17feb0123143c30782d6af8a3e807b713fc34f81c13dba3ad1ac579e03a6ad2cfb0419022e56f0634aa999291c6bce93b6988927ae7f877f31b39f7f467e95b8