Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 10:15

General

  • Target

    da209969c33db24fa5c7116d2e7fd5bf_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    da209969c33db24fa5c7116d2e7fd5bf

  • SHA1

    db8a6bfa43908adddff9dccbd89fef9c514c8d2a

  • SHA256

    085c9edfbb616fb44d91832579d5d774955c69d090757bd98c6572993729c55f

  • SHA512

    0155ff48eae7b7a2b7abdcd7f2529e566243868481745d1aec1fcd4f190454c1a6e476711d3ec138e7be191131704612305513c62f112ed3eeac2458e94b9730

  • SSDEEP

    6144:MLGDh4jLt4NVcWgyGELwXiS8T+bbhn7aRjS5ZgBbfh:yGWntWyD1LiS8lS5ZIJ

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da209969c33db24fa5c7116d2e7fd5bf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\da209969c33db24fa5c7116d2e7fd5bf_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Users\Admin\qaaiwa.exe
      "C:\Users\Admin\qaaiwa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2744

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\qaaiwa.exe

          Filesize

          228KB

          MD5

          b783b36155a5e9eb07a8363edef5f1e9

          SHA1

          b42737939839c4cd7a1ab00052531220c8a86eec

          SHA256

          2474ceced7dfb1a8cb6b926e3949c62eb12ac51222906e424188399a4894461e

          SHA512

          7e0995fe5d56a957d25f0df2063613cc1fb9d290d090d926945d68c55c65552da4ccc972ebafb44a83245e5c617e23b1cfd00ac3ba60eb98c01c6325b8300973