Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 21:38

General

  • Target

    c1a3ccc0d840b9fce75fc1aff4638aa7_JaffaCakes118.exe

  • Size

    204KB

  • MD5

    c1a3ccc0d840b9fce75fc1aff4638aa7

  • SHA1

    2c1b04da0b5cf68afad297b68c67b03101b7bd80

  • SHA256

    f5a8d30578442b6a2419906dad36d0e75ce5d45b0444f64adfa8684fc3590227

  • SHA512

    5dce5906e8315745409ad688916811f20b3f896c91f7cf7f3655645161bd785cfe3fb1cae4397e375f0d813cd5b87441806eb4e9a8eb3c13b4757c7ac1782bae

  • SSDEEP

    1536:Qv+OouHo1vzxHwxWDExNy3tQ9CW5EZWHakMwP9W6uXNh9h1AWa11GBPIdRONd+ww:CHo1DD00tQ9nLHbB9WTk9+Jgqmltvx

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1a3ccc0d840b9fce75fc1aff4638aa7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c1a3ccc0d840b9fce75fc1aff4638aa7_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\heihe.exe
      "C:\Users\Admin\heihe.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\heihe.exe

    Filesize

    204KB

    MD5

    416967bed16c1cc0e29ff77483ed1b1d

    SHA1

    5a55ed31dbd9d37e231c271caef3b16932d4b5b9

    SHA256

    a7d8eaad36714de582dba0e76827fb1d7ec0c56fdc1b34f9b847fbfffdb2fdf4

    SHA512

    101387ea216fb3d2e45331235639f566a765f3b8b662e6dd708fbb6f1dba31192a07d9fca0987092a1419d35516b6a9c1bc5a942db082dcfdb561595d2c59d5f