Analysis

  • max time kernel
    150s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 00:17

General

  • Target

    ea3ce73cc41b6fc505d77e2ce9669935_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    ea3ce73cc41b6fc505d77e2ce9669935

  • SHA1

    5153e912cdc99b76d54c44d40c22201a7234506b

  • SHA256

    8a87d24d740440f34a7bd258ffeb3f05850bbc52011555481dc908b75f33b6b0

  • SHA512

    7cff62bebec9c23d27af1d0deb33621d4849014a5538e12a5cf40ab7a81f1dfdf25465379d6729d9f168973fe50594c68b3ced353c8b66c71bf0d13efa20dceb

  • SSDEEP

    1536:n9tGY82NTzwdMGAc4ohrPXo+73Rez8b0SyKNIjnZrJ:1wUurPX7CKCnlJ

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea3ce73cc41b6fc505d77e2ce9669935_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea3ce73cc41b6fc505d77e2ce9669935_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Users\Admin\xrwiot.exe
      "C:\Users\Admin\xrwiot.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4528

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\xrwiot.exe

          Filesize

          100KB

          MD5

          ce310320c86212839cd0a22d13b4517e

          SHA1

          0e558cfc61df016c79475bf8eac9fcb6ac66541b

          SHA256

          b4d355677cc42f8754b85813d286ebc348b28ae693140ce10d5d964604625887

          SHA512

          bd9177130f02be078c739fa0f780dddc15931824303622b4da1bcf98184b75e4efb0fbd77978f5892790a8eed69282f3c8d845c46f121cc3fd6c5be7ae43f673