Analysis

  • max time kernel
    149s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2024, 08:20

General

  • Target

    e20fa59b9a10c0275432560124b09ebb_JaffaCakes118.exe

  • Size

    240KB

  • MD5

    e20fa59b9a10c0275432560124b09ebb

  • SHA1

    3b8e698ad04f0f2cb6938e922e61a2e04b3f6538

  • SHA256

    af8d1660e5d8b30c783c77232927aeb7ab26ef2f017575a8cae42492a9c8eca2

  • SHA512

    5e2cef24d4f7857b27192a6b9d3552dab14ef3de79afeae6b4ed997fb4eb80a33c46adae710b88d03b217a9b467a808ebc9598305acb894157e78db97f6ef5eb

  • SSDEEP

    6144:EULP3dwqsNwemAB0EqxF6snji81RUinKchhyMSQ:LdQQJsL

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e20fa59b9a10c0275432560124b09ebb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e20fa59b9a10c0275432560124b09ebb_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4504
    • C:\Users\Admin\souzo.exe
      "C:\Users\Admin\souzo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3728

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\souzo.exe

          Filesize

          240KB

          MD5

          b724fb6e1fa10a744b4141a211e8ba9b

          SHA1

          0759000d684b6c5a1e24975c168a4bfcdbdab9ac

          SHA256

          fccc89f609eff868ef5216d4b1321568096a05cd886cd8a8f7edc6c004a1ddd1

          SHA512

          1c8553887096a61a6de1e9180050b306b21c45a8629e1493acffa7dd490a3ae740b74e5d9c3d9d532ed77fe42231766ee09b53ea68dc89dc8bf173d27d0c222f