Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 12:01

General

  • Target

    ed8a65e4b67a9ac5f05064a3a192414d_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    ed8a65e4b67a9ac5f05064a3a192414d

  • SHA1

    42213e63da294c8a449000154dc69dc776fcad6e

  • SHA256

    b60c9357da0e4cec229077563345f112ec8dc321d060bfb5f259d1228d02bf4c

  • SHA512

    59be7fd05c3a25204f949329073719d429ecd7cc1365b9e29f01472a641394e73fcbcf2386a4a2f997ffaf4202604a70ee6d9a5851509504320a84dd39d1e719

  • SSDEEP

    1536:dKm4A/TtKH6rM2qEbBkIvI4DyQDIws/HmmYbRdfuLzwo7JaS:YA/TYH63qEbBkn4e2s/HmlTfSwQ

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed8a65e4b67a9ac5f05064a3a192414d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed8a65e4b67a9ac5f05064a3a192414d_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\pieozof.exe
      "C:\Users\Admin\pieozof.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\pieozof.exe

    Filesize

    132KB

    MD5

    022f4692c2aef03f72434a2f6fd5f8ca

    SHA1

    e16aeb9bd5ae3da1ef95c3318aa5e1bf8d1e4c89

    SHA256

    42988a1c8a6600c23d3db99f262ab09bfce0620738b5c84a151fe444a15ae52d

    SHA512

    e90b1acaa813b30e4c95d2979c9e5c03d8f6d32b4b46e671acfb5dbca3365d5a8ff0cebb403515ce0cc2387d1313dc4f9db369fa7f2a5ebd9764962f9397c6c6