Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:58

General

  • Target

    eace1f0f82f6dcebb2d5950348e3f373_JaffaCakes118.exe

  • Size

    116KB

  • MD5

    eace1f0f82f6dcebb2d5950348e3f373

  • SHA1

    f7adefe5d15ee3adc759d297029ff897c45517a7

  • SHA256

    6af22eb25856b88152fee68fd0ca9263311d05fa4aa2b1c2503f4fef69a8e1d2

  • SHA512

    87670be546b990ab6e036dba37706e88cce3bc51fbd6cf311bf8f473199d52950ec4dfb8bf933f894fe4da07a25a65885a56e1f611227d4626c5cd734b9fdaa9

  • SSDEEP

    1536:w7pxox++Q8Kw6KBOIW4Z8HO1Zwt0f4HeDUEdMOPy9sbgN2wo7JaS1:WpH+QfIr1ZNDUEdTwQL

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eace1f0f82f6dcebb2d5950348e3f373_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eace1f0f82f6dcebb2d5950348e3f373_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\pqroor.exe
      "C:\Users\Admin\pqroor.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\pqroor.exe

    Filesize

    116KB

    MD5

    0bd117701d1b9bccac6488985dda86d0

    SHA1

    c91fd0af8dbbab14cbb032c684fa196f2184f799

    SHA256

    fe8331e3fc07b60a442b2992eaa15e9116d0cc4b3bc69e04f212b33414327446

    SHA512

    df59a37f36807748e99c366b2b7a9aa57864c93bfd8590e8e8663e4b2a5a409b27bbe492df43082d9e79e558b6ef4801dc55a6f5d8e008eb76de296e727b1d1e