Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 08:27

General

  • Target

    d17faede4b36b6c4a9dae848910cac5e_JaffaCakes118.exe

  • Size

    136KB

  • MD5

    d17faede4b36b6c4a9dae848910cac5e

  • SHA1

    8af659064da622f15bf99acf1acdc46307c75802

  • SHA256

    12dc511c91e0b4133d6b8bc341989802cef5b2b1304e7fbc0e09895234fea0f3

  • SHA512

    1fc425de96f7458ecef26605009342fa3dd4843c3bc1ca3464e91a037ef47dc29545648fddc3a634a60b3230519b35f1236916456d1621cd24b57a9734c7f8b0

  • SSDEEP

    3072:fJ8aF8EHAaNKWY9pkWdHOYBs7HTbcnp886/kWRBg156CEf+2XC4bskzIYgBSw:fcEt9Y9pkWdHOYBs7HTbcnp886/kWA03

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d17faede4b36b6c4a9dae848910cac5e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d17faede4b36b6c4a9dae848910cac5e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\fuizom.exe
      "C:\Users\Admin\fuizom.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\fuizom.exe

    Filesize

    136KB

    MD5

    fc9ce071358c11288d8ee3497200e157

    SHA1

    bbc976f9c8bb3071eabf32dfd74b52ca21886cac

    SHA256

    a4fc9180aaf04879132bc5e6c128b4c2191bd41126ad4ba1713a2996337d84e7

    SHA512

    66ae63e192535184aa3e807f9ae3f3d1ed07695d6f6252d74a3c7921865a7927d73130079680d1dae962ba3384c2fd0a11a5e24c1ac88a7703abef9eaa9ecd3f