Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 04:35

General

  • Target

    ecd993dc49bb79ba7ca9db224f41c60a_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    ecd993dc49bb79ba7ca9db224f41c60a

  • SHA1

    1c7a03cc7c3a92f700c4ff947a1b860a3acafc89

  • SHA256

    33780d9b1e81c54c8cb6ae957f2fc6ce164bd55cc00b2e55a7754f4a8fa78089

  • SHA512

    6c6908d398724176909350a752302c853615191f20769781424f4a82900d2b5305df0f0fd7520deea6faea3f7e8842cb36d6dc54297f694dd75e45a2284e9158

  • SSDEEP

    1536:tytkjbTQCdMr0JU0GgAJa0P1kNmKldCMhdu8KWP/nTn8nBP9VeJXNeG0h/l:Gkjgr0JU0GgAT9QQt

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecd993dc49bb79ba7ca9db224f41c60a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ecd993dc49bb79ba7ca9db224f41c60a_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Users\Admin\neusui.exe
      "C:\Users\Admin\neusui.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\neusui.exe

    Filesize

    124KB

    MD5

    fade1ffc88258e16f764e3599d6239b5

    SHA1

    99c6c2847cb355ff77b7f40ce9a901ac36972713

    SHA256

    d6f4439a8858fafa8c75506c0702b49a52028ad12bdfe4e9057b7a1b88ef643a

    SHA512

    d979f842e95c4b33984888784c43658fbf869ca9f548b0ebe89641d91f3022e84f2550f8f3c7b3ad0a2fe02927cbe63f6214cde3829493eb65729a008b3c4699

  • memory/2644-0-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2644-14-0x0000000002CF0000-0x0000000002D17000-memory.dmp

    Filesize

    156KB

  • memory/2644-13-0x0000000002CF0000-0x0000000002D17000-memory.dmp

    Filesize

    156KB

  • memory/2644-20-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2644-21-0x0000000002CF0000-0x0000000002D17000-memory.dmp

    Filesize

    156KB

  • memory/2776-16-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2776-22-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB