Analysis

  • max time kernel
    150s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 06:07

General

  • Target

    dbf3c71d3a46c6a740c4425fe6910cf7_JaffaCakes118.exe

  • Size

    120KB

  • MD5

    dbf3c71d3a46c6a740c4425fe6910cf7

  • SHA1

    021eaf53a58bfde30c73f343b6030b7535d94f39

  • SHA256

    ee327e9b2f6f96da6a462c49497137b5c2389e06b6e3e20e391483f0bb271b40

  • SHA512

    4ba943bed173682616e9e1a7f061028e0a51e0ffd685a54247c4ce5929882a4e832a9dc5adb06a00525897443907f3a61c8a5a2301645936725416ea4ac4073c

  • SSDEEP

    1536:6TvMExXINbttA+M0KuPe+cq2+VbM5dtO2XhXTOkIHzEHPjzVddnSlv3U:6bV2fA+Mp+P2Rs2R0HgHPjztSy

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbf3c71d3a46c6a740c4425fe6910cf7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dbf3c71d3a46c6a740c4425fe6910cf7_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4568
    • C:\Users\Admin\tuepad.exe
      "C:\Users\Admin\tuepad.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tuepad.exe

    Filesize

    120KB

    MD5

    f81e0fc966d8e2ba86d6f18c941fe24a

    SHA1

    e8a7e604def03a3966d9a0400dc6d0a553f3c6c0

    SHA256

    ffaa9dca6dc6b3971df1fd72eda4c233ec51216756372246540eb4daca625198

    SHA512

    032e380332719fd4f3b285ffc46937295fe34f284eb9c78b7f26c3d71163df74c86fd13a864e81ed76000a930a7a502277271d7ad8e89fad490987071bb4d10f