Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 01:10

General

  • Target

    bfd3defede8466d96d406e57cb6a1da8_JaffaCakes118.exe

  • Size

    156KB

  • MD5

    bfd3defede8466d96d406e57cb6a1da8

  • SHA1

    3776ff7292276ce1f2077239afd6bcac07f0b649

  • SHA256

    9fdaca6686fc5a06bffe629900ef0a79bd0eb5e5da2126d5b6df6c7bf1cca61f

  • SHA512

    08d1868bde3589b616c2127369c7305647fc05fb088116bd958b49451bf2aee85f3873ea6cee7951be09faf360a109c9be6f5224ff471ab43662374c756a44de

  • SSDEEP

    3072:kUf172L2wmM39vJhjmRMKGOMztubDqrmhX1yjdLiXE5j4oQJ:Bt22wmMtRfXZm1gpZd

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfd3defede8466d96d406e57cb6a1da8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bfd3defede8466d96d406e57cb6a1da8_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Users\Admin\beaceud.exe
      "C:\Users\Admin\beaceud.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\beaceud.exe

    Filesize

    156KB

    MD5

    b44e92a61465489d9d7f3c02ba8a91a0

    SHA1

    3b9011f009cec4c5ef04efc0b9f568a258d48183

    SHA256

    2a104cea90e02053b7b8f5151725f63cc664e9c723ba982341fbce12787c33d0

    SHA512

    288dfcc9ecf5d312a73f7762f8c5a00b9bc2938268d1d0dd2df14e4c0822fcca04b5110fe11f63565ee08d28fc4bf38b64546f903f5c417bbab0d07b13aa24bb