Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 04:16

General

  • Target

    e1afabd51f6c37624891981bf4a612a2_JaffaCakes118.exe

  • Size

    148KB

  • MD5

    e1afabd51f6c37624891981bf4a612a2

  • SHA1

    810f280120c47f4f305240a2aa90c5e47a3639e5

  • SHA256

    6cb8c1be091f89b407d53208a53da2dda23992d7e08821d868bfc4651d3a8f8b

  • SHA512

    7954092d363b886d3966915be9239d09e8dc07ba3d7cf04b7e86c57cd6ffa96cac8bfb0cf002d8a6e3a911fb87d3fb44acd29e210cdbb5cfcbf2f33c8e6082d3

  • SSDEEP

    3072:CnD+WuMBspr8+k77/pswWR/x0+dv4TLxyK454oQZiEKcj/:kSWuMBsFvS04+dv4TVSW4e

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1afabd51f6c37624891981bf4a612a2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e1afabd51f6c37624891981bf4a612a2_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Users\Admin\goafio.exe
      "C:\Users\Admin\goafio.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2868

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\goafio.exe

          Filesize

          148KB

          MD5

          9fb01eeeb563cadf78c31130d9b52bf6

          SHA1

          36be43bf612460fca0cb2b2e670c95af2b6e163b

          SHA256

          5bef8cc986edc9f5fa07d535a169aa8031af712d205621875083ab3da9a6f771

          SHA512

          aa239c3fd49d6cc519601e03422bda6c2b36a7777b00515ddcda336ab1c8d4474ed504ee218607a2b06c35ea0edbfb1ef1b1f20b1bdad91a4c83ce7db1567c61