Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 09:35

General

  • Target

    bb337ae78eccd449066f32f2c20921f6_JaffaCakes118.exe

  • Size

    244KB

  • MD5

    bb337ae78eccd449066f32f2c20921f6

  • SHA1

    bacc8e97e02323ade762f894434126ed1dbfe113

  • SHA256

    6a607460a83ac6e7bc3f7b4c3ec92073ade1ef548c96967b7478d78a4defa505

  • SHA512

    f9374ede2e904e8cb6e5c79208f137e842a478ec6615c708da082dc0b5ed9d46f08296b21c211e068200daf7e4e1f2a61716433acdeb47d6d04413bd9941d90e

  • SSDEEP

    6144:oGQ+u5HAPkbZjPJDmlI/+dfkIOwgccXYJcmI3cvHQOFZayUa/nM2O:oGQ+u5HAPk9rUoYJcmym0R

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb337ae78eccd449066f32f2c20921f6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bb337ae78eccd449066f32f2c20921f6_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Users\Admin\wiaeke.exe
      "C:\Users\Admin\wiaeke.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4988

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\wiaeke.exe

          Filesize

          244KB

          MD5

          b3bf635dc94004dbfab224843b375f09

          SHA1

          2de1540179b72eb02ac94f178e60dc3f44616cae

          SHA256

          5f17cf36c5b3f743d7051e78bf6b2abe4057987f92bba43830f1a1227a7653f4

          SHA512

          6b9b7a3b58c6eb0408cb89d9f35c603074323472a36d67276fb7cb178afddcc2aca2e2e6dc7c6a56c5cedc31a2ff576ac9e25dffafd3ea71e6d7a88ca69c8680