Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 03:59

General

  • Target

    eccd6903e82f5ab9241072019b7abf65_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    eccd6903e82f5ab9241072019b7abf65

  • SHA1

    483559dadae9ea5726ee767f3cfe43063f17757f

  • SHA256

    5edd5fdd794f68c5c91357c1222eedff4900b9d093c521fa035e6467dc9da8f7

  • SHA512

    a3cf623e4e2d47175bbe5343896befc23b55d01195aed985d429b7190dd04edade9a4e8c4480e8064835b0911b873ddcf5c5edf805cc0ead6b2823487053b065

  • SSDEEP

    1536:ZwWuRgYu9+7gWbrimfWSeJFzkRcTwdE1dIumgDL0FfxTGCpipMQvOp:ZwuT8gWi2eJFzkRswZumgDLOfvipMpp

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eccd6903e82f5ab9241072019b7abf65_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eccd6903e82f5ab9241072019b7abf65_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Users\Admin\zeuacu.exe
      "C:\Users\Admin\zeuacu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zeuacu.exe

    Filesize

    132KB

    MD5

    df19acf3753642d4bbaa9e708dab0834

    SHA1

    d8fea4c6108b7f51d911d98f020a88873e2e2a03

    SHA256

    fbf8d024bbb9a6c8ae15b9550f2cf4e997a6a648d80b73a4f236fad1446fc5b7

    SHA512

    9094e618101bebc9b7889694f9dc1de6658fe9134a7be0be36314ef7adea728d12d891059331b36a2b4cb9e10336dc1d9a52518b6390a5fc11c13134a0bde229