Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 03:11

General

  • Target

    ecbb1021fd3ae4ab0500d1f4eca5c8f3_JaffaCakes118.exe

  • Size

    120KB

  • MD5

    ecbb1021fd3ae4ab0500d1f4eca5c8f3

  • SHA1

    df6424fa26f12ccbf70b2d09aa0d54e748eff01c

  • SHA256

    38c3dd782ec751374fca8c751b8ba531fb2b79a1f1662bda39aec63d22457d75

  • SHA512

    32795d48f13fc47bb7092bcb0f3bf1eafa7554cf08fe69313156426f369a4c81e7ba6fd4365fd18e9d150fd042a2f51585fd4eb760a9baf1dd5d9168cb8c147e

  • SSDEEP

    1536:xGd+qAIAgd1/FXWG6izZNP6RQ3mncbvbj3a2HCBjsXLl/Gfx8XNf0OZ:xGoypd1/l0izZF6yCenK2iGlefx8X1l

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecbb1021fd3ae4ab0500d1f4eca5c8f3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ecbb1021fd3ae4ab0500d1f4eca5c8f3_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Users\Admin\vueidu.exe
      "C:\Users\Admin\vueidu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\vueidu.exe

    Filesize

    120KB

    MD5

    d6688ae05109921cc08d27a3eddc62ef

    SHA1

    db1f05b1385904f14249d7212c6b7599c76c205f

    SHA256

    df46fa4e1225fad577c4cd861101941cbb0866bab074e24dd6fce694cc403689

    SHA512

    3074e5ec0cc517dc23b8f36fe5cdb30399aafa0218fdfd9279497d73720d1f7338f30c26dd2efa158012c8f5f92516da12bdca901d1cd784d89f36642a644a25