Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:53

General

  • Target

    ea89268b47eb8a7f70c3c549b5fdb01b_JaffaCakes118.exe

  • Size

    220KB

  • MD5

    ea89268b47eb8a7f70c3c549b5fdb01b

  • SHA1

    1c7305571092e369fe96c8a978a0945bf842e508

  • SHA256

    9fe745d70a5c2da0c1dc83948559e83a1b271dde9d4df581378aafb448af7c6f

  • SHA512

    210e003eb5d77d9e0d367f4ec24f29b1fd1987b406cd1a26aa5999f5d8f841c9b04fe6fd6ff3c755b2ea58fd0bb87cf031579ed7bd5fad95f0447b8f54e1101d

  • SSDEEP

    3072:pPR1SrkkY8YUL4qx9RIHgil3UuhSa3U3dD8d6Oy+MIrnj3JjN0J:L1SAkx15x9SHVeOjf+

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea89268b47eb8a7f70c3c549b5fdb01b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea89268b47eb8a7f70c3c549b5fdb01b_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\dytuw.exe
      "C:\Users\Admin\dytuw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\dytuw.exe

    Filesize

    220KB

    MD5

    66572ec805e554f33022aae08c897447

    SHA1

    dd616dcec78424804dfdbc6838646ebf050081ee

    SHA256

    ca5872d914fcbf0dfb3bc76c196ba5401f47012d16166ff25666e24c13ed4351

    SHA512

    65bb0dbda1ffdbff320482c3d274fbdd0fce5f098e700033a914d576da2ffbe9f7b47c7dde8e20a07a5812613f932b1009c3d4878111b67a36be198e785bd75e