Analysis

  • max time kernel
    149s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 04:48

General

  • Target

    ba6a98ae57f6fd5ad1a2dc30ad61e93c_JaffaCakes118.exe

  • Size

    196KB

  • MD5

    ba6a98ae57f6fd5ad1a2dc30ad61e93c

  • SHA1

    98594ad6bdeb7f1a388345d1b51f472a66217e52

  • SHA256

    a04a047a6744381a880d001b21430f38f5b9d9cea5f6f7d6b3bb8a387d48cc54

  • SHA512

    8b7cc46310f462bf5dfc892aaefaaf4b98a76977ec804665836db3fd31e1c89559570266e6bcbf397a728c0635198410aacb9e497c5f2bc26809698a23d98062

  • SSDEEP

    3072:wybwt+0tQ9nLHbB9WJvA7DejJuKvEhfmHzZ:74QxL7B9WSvejJuB+1

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba6a98ae57f6fd5ad1a2dc30ad61e93c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ba6a98ae57f6fd5ad1a2dc30ad61e93c_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Users\Admin\foulea.exe
      "C:\Users\Admin\foulea.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\foulea.exe

    Filesize

    196KB

    MD5

    cc1825a364840f8de1b5e605e9242430

    SHA1

    3558fa9b0987b5a0e239ffe903723965b5770097

    SHA256

    4f49de003cfa8621250e3729fcb994cf08a7e67235cae9afc12a84f3bbcb9ca7

    SHA512

    ec5a66d4d58437794ae15260de908cc9579ebd4668d4a7efbafa9f10ae58f34b58a8ffbf50faa61e2a59e801e674fc74e92bb127c0329e20d03d89d9ff5d5e89