Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 04:39

General

  • Target

    ea9a0415c998ebe8445a95d760c91363_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    ea9a0415c998ebe8445a95d760c91363

  • SHA1

    ae810fb429ff878ea07c1f2c3cf934e799e93890

  • SHA256

    19c1e32e12d93826b8920480d92977fc72b96289c20a436a17d810c528d97bf2

  • SHA512

    f41bd04fbc977001ae937930d22c0f5559724150f5b1e5d2658cabae60cd0657ef467f9529cf686e4030ed2df83646e617e5e8834e51d4afd53de4747d812e2c

  • SSDEEP

    6144:Ubzz3lZiu5dqmYN1v4579/piV1POH1f+9GolHSfHXovNvunQyMqtnh/wqJ:1

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea9a0415c998ebe8445a95d760c91363_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea9a0415c998ebe8445a95d760c91363_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\fauye.exe
      "C:\Users\Admin\fauye.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fauye.exe

    Filesize

    228KB

    MD5

    097a66179b6945ec4f1dde2bbc4068f9

    SHA1

    10782f9a4564fa986782e512da51950de8292838

    SHA256

    fd74529be4fbed467501c3d2212b7fda0fde28f7f53c841f9b8603cb06ddaefa

    SHA512

    55cb6f2eb19564f3dbef0557484576a03ed022086a10baea774ccf01984091c95909b0400be8ca38166e1bd21e67177745ee9a00bbfd6c22c289b7a1ea8ec019