Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 13:44

General

  • Target

    edb73b3859228cb8c4965431a634120f_JaffaCakes118.exe

  • Size

    288KB

  • MD5

    edb73b3859228cb8c4965431a634120f

  • SHA1

    56127eca1b73adff0e1215784dcce6926fee3082

  • SHA256

    79519fd70af8a8dabeff6dd36bdf791c6a973474fb41a9ea2bdd3d36ef478d2b

  • SHA512

    db0bbf4addbcc2faadb000c9e217fd757af6ec3efb3af6c9a2e3165acccd4d33fbdacf73b1fb3631488730f9da9d2520ca6a706c3fba5a9285ed3745054c6305

  • SSDEEP

    6144:U6XiUvbGuOdn9Z/QmO6Ckobf3fGCmahGLtEU:yUvbGuYnXQmO6Ckobf3fGCmahpU

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edb73b3859228cb8c4965431a634120f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\edb73b3859228cb8c4965431a634120f_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3548
    • C:\Users\Admin\qpdaas.exe
      "C:\Users\Admin\qpdaas.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qpdaas.exe

    Filesize

    288KB

    MD5

    0f56da1725d72212cd00bf06f5bd9b64

    SHA1

    ebc007dea5d379a3c4171eefe9508c1679bdbbf6

    SHA256

    f223a222b021a0a4a82f06a3b6f38d2cde99a48a9eccd518b150fd79106c0980

    SHA512

    ce471f2a2fcc772eda2c21d1bb3f900fe8696e2f95a79f7eebff6066ab9784f646fb9670f7adad58223237ce96c07168bb4e10e8ad4b566ecb89f67a09995e51