Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 02:01

General

  • Target

    d3494cccedb2b283d4132c1037072ab2_JaffaCakes118.exe

  • Size

    176KB

  • MD5

    d3494cccedb2b283d4132c1037072ab2

  • SHA1

    24636a60c4c1aded80cfd26587ddd07f17c20e34

  • SHA256

    9ba418c9ff4574a5b61cfe3f1601445db87a0d6e993b2f553d03b7a27cb43721

  • SHA512

    e6394b4e3cc041118d2756e066825b3fd1b24fec3567a0b4cd0099a75aa3310d6cfea5dc633e885d9c0d283230a59913ba7ea5b492f38e6f6782fc0298cecb1e

  • SSDEEP

    3072:qzpUOUP8b8RuBnI16UCceGyYyKnvmb7/D26VNr79JEx/G/OOIVLM/tAGjiBuAZdW:8RUkwuBnI16ZoGKnvmb7/D26P/9JEx/s

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3494cccedb2b283d4132c1037072ab2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d3494cccedb2b283d4132c1037072ab2_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Users\Admin\hxrep.exe
      "C:\Users\Admin\hxrep.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2572

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\hxrep.exe

          Filesize

          176KB

          MD5

          3b0ab42deeef53ef09416d3c0f867881

          SHA1

          13eead0559205c9137598976ecbd3aa6949e3998

          SHA256

          d8e3e1f442569c9541e61d29a1d231598007dbb1e029693997dc14ad708539ee

          SHA512

          7f82e4baf493c9d61e7b9c0675c547ad1a0252588d46b9d9b7f443229e79238cada3533104f3b27eb6447ec1bbeb1966a798ba971add8d984f291a34674c3c28