Analysis

  • max time kernel
    149s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 22:04

General

  • Target

    ee836b38037930a2dfc39676f0ee44b8_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    ee836b38037930a2dfc39676f0ee44b8

  • SHA1

    ba107021d8c3fca82313dc78c64526d33bd9aa0f

  • SHA256

    60a9edae44a04938a2bfbf5a0f10378739b185f3ab55610fbf1ae2045e2d0051

  • SHA512

    dc8e7de0f90389ad1e65940849c698f425c47aa181c62369ae85dacd61b446ccfe28194a8109f1c2f1503b3cb245f01da66cbaa5a6cf7e36b4121a1acdcfef11

  • SSDEEP

    768:vDFIjMEddaqnObOasGEwU8Z1Rbe2kjEQJQ1H7a8zFkzqcw+4O:ZIIxiCU8Z1QjEQJecw+

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee836b38037930a2dfc39676f0ee44b8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee836b38037930a2dfc39676f0ee44b8_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3420
    • C:\Users\Admin\laofu.exe
      "C:\Users\Admin\laofu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\laofu.exe

    Filesize

    88KB

    MD5

    1e4043ed8ffed80cb8ad4336d6e962ab

    SHA1

    69348b1bbcf26ac1c829be2a3707c76fc40991f9

    SHA256

    8ff7d2ae53e368d6e9ffd4ca22c183d937bca6a1fa93b7e454fe3cd851a0230e

    SHA512

    a2659d7d3c6b96a2eebb89deebb65bdaa84c53c098ba34b23e0526e5510c674efc8137f346dc6135477cf23ff626e55ff3656fc4cd20b14c7473863b13f77951