Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 21:34

General

  • Target

    ee76d371e2c9cb396729cd6d670a03f6_JaffaCakes118.exe

  • Size

    212KB

  • MD5

    ee76d371e2c9cb396729cd6d670a03f6

  • SHA1

    78cfb2a08fd4571f054b244083bead9dd0cc9bb3

  • SHA256

    3954a9208126fbc7d8d492a070a4997623c57dcf82c67beebeb7685b36b9f4b7

  • SHA512

    4424aeb7f5189fa3d96ff3f203006deb6850107771983a6b412e5595e21805ef152036f6b4c2b0a67141f79610d5c7d161e0eb96ab75473054c6ff5c81a5ace4

  • SSDEEP

    6144:4CKHFwzWQrO8J0bqihew3b7KvfCBnn78MDxG6oRKnvmb7/D26NhHmpfXJNRYK:nKHFwC8J0egew3bevfY78MDxG6oRKnvP

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee76d371e2c9cb396729cd6d670a03f6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee76d371e2c9cb396729cd6d670a03f6_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\keufa.exe
      "C:\Users\Admin\keufa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\keufa.exe

    Filesize

    212KB

    MD5

    88a2cc8fe0dabb1ca1482dab7a12c5c9

    SHA1

    3de212b14a81458ae514acd76c95b7102ca989bb

    SHA256

    24a5d27eeea9946e8e74c872b18d936b12b57b6c1b806e41679be15559fa72e6

    SHA512

    b731c69af776d7abd4342432328b82900d2c3ce704fed4666d508c2a5cf4e2f9d5ac9ded83a5f07f51b2900ac230e1b1907b0419b9497058d1602dd92bcb3f18