Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 19:54

General

  • Target

    ee5126a9815b9f7f8dca4c67afea77bf_JaffaCakes118.exe

  • Size

    232KB

  • MD5

    ee5126a9815b9f7f8dca4c67afea77bf

  • SHA1

    7951abc1c59ef46f8722ac0b942394f13f5406fe

  • SHA256

    77defdbfbbc8a29dfeb1b852188842d140e19636e0732a94ede5adf4a79e528e

  • SHA512

    70b4152ba8ba242410de13769ef526fbb75c2febf6732c36606ae8251aec37a3acdb0497948825b8947c53a422c8eb98dfcf6cdddc318071652e152935b3c149

  • SSDEEP

    6144:k3PFKs7diixRSFBfWEqxF6snji81RUinK51jbkxkurF:ePhJuBXVbkxJZ

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee5126a9815b9f7f8dca4c67afea77bf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee5126a9815b9f7f8dca4c67afea77bf_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Users\Admin\paapup.exe
      "C:\Users\Admin\paapup.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\paapup.exe

    Filesize

    232KB

    MD5

    612667fbca2e6e98e5509423739f7fc2

    SHA1

    4d09882cc63bab9e7f9cbb500cf0099df14e5012

    SHA256

    883d4b8b0882c98befa8917c2a859c8727ac17419c3990e1d1c59577890d4a0a

    SHA512

    fae0566a144a97d3a0271acfc7d3b0708321f404b9044fc9c0e5a4f1cdf179aeb72dbcbc323be6c6f43fc885970ee943a5227b99f4a2b4e4a4d7c010e04a6cdb