Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 06:19

General

  • Target

    d3bb3c871a045fb100ab8b589a8c9499_JaffaCakes118.exe

  • Size

    384KB

  • MD5

    d3bb3c871a045fb100ab8b589a8c9499

  • SHA1

    9e568d839dd212915f4565890172b7b336a9aafc

  • SHA256

    aafbe46b34582c1af07c50da72a21219537c25927cf241ad60f4bff7b518a25b

  • SHA512

    fc98b76e804d33099bb674a81302e790bed413e32008c53ec61605dbd081105e1ad855950c926192fa2d4f29ec2bc29bf0ed62d9a0ce968dae26ea796f46d17a

  • SSDEEP

    6144:Ustj9IYdG6uM4a2TURdxDZ23w8QEoKHjWZLKBPvHIWMW:C7a9Z2A81vWpaPvD

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3bb3c871a045fb100ab8b589a8c9499_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d3bb3c871a045fb100ab8b589a8c9499_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:388
    • C:\Users\Admin\cpbiuj.exe
      "C:\Users\Admin\cpbiuj.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\cpbiuj.exe

    Filesize

    384KB

    MD5

    c4ed6fd6696177246cea9fd3b20e84db

    SHA1

    af3685244430f3d24bddae948990a336eba33b38

    SHA256

    18bddcd6ed17226fe6a3f6e24b69587ce88c47f97d5b7a5cabf90807ef22b540

    SHA512

    0de99be74e5cda80334cc9246d269f4f0252253fa0cb16627275c1f88f6c1a9a8017048e4d0c5586f4dd02f8c91f117f37fdfcc0a6a32aa6b5c6973374e1865b