Analysis

  • max time kernel
    150s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 23:44

General

  • Target

    eeaaa83600bb99c4f3a6b854fe753501_JaffaCakes118.exe

  • Size

    152KB

  • MD5

    eeaaa83600bb99c4f3a6b854fe753501

  • SHA1

    8521fa4903acad150ab777923688bb61463a8e7d

  • SHA256

    37d2651641a0b1d1738c91d3c549ad6363bf44d27d413a69a17fb7b2bf39ae26

  • SHA512

    0bf2a567968d76452335e042951fe81c459c6265f22f4a3c0eff6b8ea660270c8ba9cb69c6023cd3eddfd1a37f4b78c0fc8910294a178bf67370b215fb71d1d2

  • SSDEEP

    3072:79bEcFD0N5BdKxmSI7Dc/19h83AiPa2fWwkWlKYRNYqXbChk4QFrQuyNRS3vQr:xj0SxmH4/19S3AiScWnWlKYRNhbkyFU2

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eeaaa83600bb99c4f3a6b854fe753501_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eeaaa83600bb99c4f3a6b854fe753501_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4740
    • C:\Users\Admin\muios.exe
      "C:\Users\Admin\muios.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\muios.exe

    Filesize

    152KB

    MD5

    15e151eeda95c358f6b433cef9b5c6ed

    SHA1

    de7bb7f2abc85980a7b6bed0aaf4ea686ba981b5

    SHA256

    db1402d6d5ab7bae01dd665fe6ec9bbdc0786113b9d93ec8ec707929b33f9413

    SHA512

    8eb14d136388ff53cd587822308e59db943f700cd9a9cd15abd35473dcb72c53064d9ff757e2fa2999bd3b906bb6af00f9914d0837e7d60cc407ba08f1574e2a

  • memory/400-33-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/400-38-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/4740-0-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/4740-37-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB