Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 17:53

General

  • Target

    ee20eafb8e2dea3b793c513df2c0dad2_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    ee20eafb8e2dea3b793c513df2c0dad2

  • SHA1

    5e5823cd359869735e886507bd144043d240947c

  • SHA256

    969d7b79b292a09ee9d6472ea46408401e178aee673d8b381b2ccd1b4434b9d8

  • SHA512

    06ee3b610ba53ab47133202be6260c29dda2a48f2169af9e6cec879236037c8ed6f1a62d2b5bf23d726022ed62995ba6c33b04411e9c8a681e6ee7e0ae7fc5ca

  • SSDEEP

    1536:uLEFhwRn48NuBxeDtMYHa27J14ltxporZ45izNeG0h/x:IEFhwR48NkeV6gJ1uCt45Jp

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee20eafb8e2dea3b793c513df2c0dad2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee20eafb8e2dea3b793c513df2c0dad2_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Users\Admin\neuedu.exe
      "C:\Users\Admin\neuedu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\neuedu.exe

    Filesize

    124KB

    MD5

    e6a28ffb6d5af82166408a7bb5b63690

    SHA1

    260eeeb6fcbee6b7cd1299563275f3bde1f05e4b

    SHA256

    540c0874db6e1ad912b86a864e25f43be2a5412982b0a5fb7181d49f58b28888

    SHA512

    7cd5f25b394ba958218e11c2f0c0ad8fefcd9405bce85df2c717620c32188485d26f03b220c274b5d0d5a5e019d374facf195bd535ae8ac6dc7d27e8c3937746