Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 23:44

General

  • Target

    eeaaa83600bb99c4f3a6b854fe753501_JaffaCakes118.exe

  • Size

    152KB

  • MD5

    eeaaa83600bb99c4f3a6b854fe753501

  • SHA1

    8521fa4903acad150ab777923688bb61463a8e7d

  • SHA256

    37d2651641a0b1d1738c91d3c549ad6363bf44d27d413a69a17fb7b2bf39ae26

  • SHA512

    0bf2a567968d76452335e042951fe81c459c6265f22f4a3c0eff6b8ea660270c8ba9cb69c6023cd3eddfd1a37f4b78c0fc8910294a178bf67370b215fb71d1d2

  • SSDEEP

    3072:79bEcFD0N5BdKxmSI7Dc/19h83AiPa2fWwkWlKYRNYqXbChk4QFrQuyNRS3vQr:xj0SxmH4/19S3AiScWnWlKYRNhbkyFU2

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eeaaa83600bb99c4f3a6b854fe753501_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eeaaa83600bb99c4f3a6b854fe753501_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\xeapea.exe
      "C:\Users\Admin\xeapea.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xeapea.exe

    Filesize

    152KB

    MD5

    1635d545904b08c9b39244c21848c68e

    SHA1

    ed8aec76e824bd43dd010475784af8ab19300413

    SHA256

    d8a6eff70b10ccebe609e9c3362912a8c6f7c71d957ea4049d0f2292e3390302

    SHA512

    2419a42f96c1675050be8491d60396b7100bbf64a29db90ad4c7b13626319e80dea53beffbeb0ffeb91d3ac6808e63402452b012031d5eeb4c067301e7292279

  • memory/1544-15-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1544-21-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2568-0-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2568-14-0x0000000002CF0000-0x0000000002D16000-memory.dmp

    Filesize

    152KB

  • memory/2568-19-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2568-20-0x0000000002CF0000-0x0000000002D16000-memory.dmp

    Filesize

    152KB