Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 11:50

General

  • Target

    d44b63eac1d861066780058c041cc8b3_JaffaCakes118.exe

  • Size

    60KB

  • MD5

    d44b63eac1d861066780058c041cc8b3

  • SHA1

    97751d76feceaf64c4989d8f781412c0ee6c520f

  • SHA256

    4363d8809cd8c1feb2f940100fa5a3955d87f3391b602db910032e3be432e100

  • SHA512

    4a24f93cf86b4b351fef4a5dc56716a0f9c8c2119f63654953ec3f0fdb5fbbbec6be666cc66ca9b0a5f4095a61b8120ca006b3504d5cdd8bfe20ea00a0b83c1b

  • SSDEEP

    768:7Xmx1B040a742n2D2n/z/D0lbdfs3OfKDHGqHg6WBI:7XOaaR2a/Dxg6WBI

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d44b63eac1d861066780058c041cc8b3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d44b63eac1d861066780058c041cc8b3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\biecei.exe
      "C:\Users\Admin\biecei.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2360

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\biecei.exe

          Filesize

          60KB

          MD5

          6d041b231480829ab497bfad266b63eb

          SHA1

          17f80897464f7af5b150dee0bec7a796e4dc69a8

          SHA256

          9808e56c91c6eee7334d1c0d4d52936c9dc2c338cba7c9b76b81ebbe12320f03

          SHA512

          c4cfe0ab45eacdf039c5de755d411b2242aa53188692d42cbbf71b1de89fc379976fc92adc8b54cd2d8ea4e25bbd03f4721509081fcd98dc6280a53f5bb92309