Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:20

General

  • Target

    eaa9123b8339467296c5eb414eb3f2a2_JaffaCakes118.exe

  • Size

    116KB

  • MD5

    eaa9123b8339467296c5eb414eb3f2a2

  • SHA1

    48c67b5525e7e9c76af9598bf1f8435a6e8a247a

  • SHA256

    619850966aeeb29f63a25efe60fbb2ae76ac506e1eb92a63c7e09635df48c3cd

  • SHA512

    f3dfd6506c358fb91da5746c041212e067f13eb34fec7b33c99d03bafab1859c998dc8b96cad2ca8b78c340934553a3b3830cb6860411f0d9d8f5a45de67857f

  • SSDEEP

    1536:f5JghTZdSg3Ojs8koyAFx57YjHzZ5oFDOukt5ycQg:xCHog+jMLdjHzboUuyLX

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaa9123b8339467296c5eb414eb3f2a2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eaa9123b8339467296c5eb414eb3f2a2_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Users\Admin\muaexi.exe
      "C:\Users\Admin\muaexi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\muaexi.exe

    Filesize

    116KB

    MD5

    85a624682253ecd3db6d6d3c5321c9e4

    SHA1

    18cfb99f60fbe597e2712b3071b94d2917240b09

    SHA256

    490f7f988200ef2db1e88aa98725101ad663e685becffb04aaab22e8eefeebf4

    SHA512

    48432247c3913ae351c9a077ab3e69493f87449c13c72614c09a900b0468b7e29fd0f407e5e6e04051eb15f6f1b388fb5c48bb4beda61c0fbbfc03803f6b145c