Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-09-2024 10:15

General

  • Target

    da209969c33db24fa5c7116d2e7fd5bf_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    da209969c33db24fa5c7116d2e7fd5bf

  • SHA1

    db8a6bfa43908adddff9dccbd89fef9c514c8d2a

  • SHA256

    085c9edfbb616fb44d91832579d5d774955c69d090757bd98c6572993729c55f

  • SHA512

    0155ff48eae7b7a2b7abdcd7f2529e566243868481745d1aec1fcd4f190454c1a6e476711d3ec138e7be191131704612305513c62f112ed3eeac2458e94b9730

  • SSDEEP

    6144:MLGDh4jLt4NVcWgyGELwXiS8T+bbhn7aRjS5ZgBbfh:yGWntWyD1LiS8lS5ZIJ

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da209969c33db24fa5c7116d2e7fd5bf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\da209969c33db24fa5c7116d2e7fd5bf_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3508
    • C:\Users\Admin\zeiip.exe
      "C:\Users\Admin\zeiip.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zeiip.exe

    Filesize

    228KB

    MD5

    59363ba16c898afed30b9e474e6dad24

    SHA1

    79ff7a400ab9947a6dfe3b8ef28bbb95c964fe69

    SHA256

    98b93a51efaaf6dbf360906c385fe6343cb594050e28ab3591d4e0ce40b44adb

    SHA512

    298ec1496de0317b706de63cdb3c6060a03b64433d9e5210e516c38b6671c9b2d00d06083ed448c86debd4a65d637cc87d211761d0e1b353bdaa11edaf6eedfd