Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 18:43

General

  • Target

    ee34cfac14c1b2be0037921521380595_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    ee34cfac14c1b2be0037921521380595

  • SHA1

    7742a930af72717a9cc6999ceb0097377894b210

  • SHA256

    3d0e52e1010f665a5c4d4fbdd1732b8218a96e67b6427febd693d003a203d9e7

  • SHA512

    0a934b866f7155e81c02ad00cec09ffd391d8a92d50b424b0c8d53cf20bbfc611b87aea8ffed9870b891c9b2ae235c07a90cd2f58bc8d1424984a6d532a4f040

  • SSDEEP

    6144:+EdlN3PFKs7aaOKW8alhrEqxF6snji81RUinKGHgDaSK:+EbZPhvENPH6ab

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee34cfac14c1b2be0037921521380595_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee34cfac14c1b2be0037921521380595_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\veuqu.exe
      "C:\Users\Admin\veuqu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\veuqu.exe

    Filesize

    228KB

    MD5

    e8e1219139e50fd0602699bc7ec0d311

    SHA1

    61e2a98322b2b6068cbd37fd7496fcdfef093780

    SHA256

    b2b12d575e89b7638c82a02de0a3074affac0a72afbde00f08d040dc92730758

    SHA512

    df6fef5f48e77a83c71810767a3f025cd71bdc6f1e25702f31c48fdc251f3d7b51cedee734fae14e3f0681fcf7b1a56ae63d7943a6eb7954149fd18d3e878db4