Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 14:44

General

  • Target

    edd1824ba775f9af12fe5e3015a039e3_JaffaCakes118.exe

  • Size

    240KB

  • MD5

    edd1824ba775f9af12fe5e3015a039e3

  • SHA1

    e9e29d3cfca9ac2a30aee821f2dd12e74b6d32e8

  • SHA256

    9e428646d05b8fd49c634f65509d3d5c334bab113cbc1ff44d1ff396c4f06db7

  • SHA512

    5d19640cef000f0223caad43e05af1ca690b46f355841677ce6f5be92a0e0f0a48fe23ad1f997811b022faa5cd14169ca4cba8f06e305079b4bed4e9db96d298

  • SSDEEP

    6144:Xf3dwqsNTNEXGlQR58EqxF6snji81RUinKq3aEESliD3:XfdQKjeaEEpz

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edd1824ba775f9af12fe5e3015a039e3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\edd1824ba775f9af12fe5e3015a039e3_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\duipo.exe
      "C:\Users\Admin\duipo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\duipo.exe

    Filesize

    240KB

    MD5

    5d59ae9430d2041b1211de5199be2ad5

    SHA1

    efce0ef9d563d98a313d9ab66b9f9545bd989aed

    SHA256

    e23fb85953d79a62b9f960b47f8e13e6d6540810b68ea0821376c26ae109ebe4

    SHA512

    bfc6bfa1f88631b34c8c65e1b51778c55669f6b4c97e856b6af4e6830cb49ef368ec37cd92753820b835e975419c22534450b68df26966ecbf30061a55c5f791