Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 12:01

General

  • Target

    ed8a65e4b67a9ac5f05064a3a192414d_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    ed8a65e4b67a9ac5f05064a3a192414d

  • SHA1

    42213e63da294c8a449000154dc69dc776fcad6e

  • SHA256

    b60c9357da0e4cec229077563345f112ec8dc321d060bfb5f259d1228d02bf4c

  • SHA512

    59be7fd05c3a25204f949329073719d429ecd7cc1365b9e29f01472a641394e73fcbcf2386a4a2f997ffaf4202604a70ee6d9a5851509504320a84dd39d1e719

  • SSDEEP

    1536:dKm4A/TtKH6rM2qEbBkIvI4DyQDIws/HmmYbRdfuLzwo7JaS:YA/TYH63qEbBkn4e2s/HmlTfSwQ

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed8a65e4b67a9ac5f05064a3a192414d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed8a65e4b67a9ac5f05064a3a192414d_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Users\Admin\xuuqe.exe
      "C:\Users\Admin\xuuqe.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xuuqe.exe

    Filesize

    132KB

    MD5

    f901d8242b9b1c11ade8ab73bac99c39

    SHA1

    9f20bb69a87a2fe84e021a4bd1e98aa47c72e79e

    SHA256

    2abfd634b213aa0f416a1c0935de9e9c1e39abb7e0f24386e7a52e3773b36d8d

    SHA512

    bbf6f03e9fffbc6f355c3857581cb3b6513f4da706242abb1c2f25aa26887c7c6d509d2de2343bd06abc2f979cb858dbd73e74bd0b6dda5b23ef77a4c8d07e1e