Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 05:01

General

  • Target

    ece34bb15bf1911484b7e0b7d0dbb4c5_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    ece34bb15bf1911484b7e0b7d0dbb4c5

  • SHA1

    512dbceb8cf213788ee9ea1a670e18e41d5ef1a0

  • SHA256

    6648c3c4db62c89ad4528c6570f582f5ce1d92cf3e70e347d9370bf8f50d4d03

  • SHA512

    988180e301215dd71cd46926ef20edbdcca66b42201c34e5977ec56b9629eacde270fc78864654feed203a885bc0eb1279b928f1e50dca14c98c71f3da03e2e6

  • SSDEEP

    3072:0fDYbtX6RzvyuOi89Sey1AKWZXl7miWmn/AoQ:0fDOtX6RzvyuOQesWbScA

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ece34bb15bf1911484b7e0b7d0dbb4c5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ece34bb15bf1911484b7e0b7d0dbb4c5_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Users\Admin\rplig.exe
      "C:\Users\Admin\rplig.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\rplig.exe

    Filesize

    132KB

    MD5

    1f37b4ee492182cab076a725b066d971

    SHA1

    9109769948e15c674bd08074d7fb8ce55c66d5ec

    SHA256

    64822c9c7db94661d01e0f0f01c76b5d80a541ae624759a934aa854eb5b6ada1

    SHA512

    746fe18a7a25525fe1d21dc11a6e991432e00ccfeebc40e65f832782ef66a792f55f60414f9a799700b513c3df14d0d13f60f119c54749bd1a664f394626441b