Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 03:41

General

  • Target

    ecc67a87fa74712efd1aa2a9dd3006b6_JaffaCakes118.exe

  • Size

    232KB

  • MD5

    ecc67a87fa74712efd1aa2a9dd3006b6

  • SHA1

    20ceaa7b7ed6249866539d99cb46dc353498b6f1

  • SHA256

    3c3933debd105edfd7103c7ddef7510f9d75b76bf67f685cba7f0486ef4632d1

  • SHA512

    3ecf9132d7c776e2a9c25181e17aca938008351bc655b9eb2c22fa381e8a38f2c216c37f60026c60f762b2cf0a972c2ed76a7d6368bd8dc5c1c671a51fa20e08

  • SSDEEP

    3072:spMeBc1YwN1Smm727IJCkvIwXX4Ph0ApMXyKKl+Hv/91I/2X3lDD:spPBc1YwN1S327Y54Ph0TXQkd18C3

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecc67a87fa74712efd1aa2a9dd3006b6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ecc67a87fa74712efd1aa2a9dd3006b6_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\nuoup.exe
      "C:\Users\Admin\nuoup.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\nuoup.exe

    Filesize

    232KB

    MD5

    5b55c6edf86c1913432fb6103f25a65d

    SHA1

    13c6eda521ff1b87b51c60aa23f87cdf4b7b4d15

    SHA256

    acef6cb42e722248b4c4d1d3dd45ed4375d2d125355827e75ca86f5aaa963573

    SHA512

    792eda008d15be515a69e96633ffb5cce84d938ba75dd6ed03c2a572523a5f8d3444990eed5d9a27886ba22ebc29416126dbf39efe5efe7be19509885da3f397