Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 18:48

General

  • Target

    f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe

  • Size

    152KB

  • MD5

    f06e9f56b1a4c0e83eb0860274cb6624

  • SHA1

    cb73e39226e9fa7465dd46de30ab11ab2146dc99

  • SHA256

    f742a8de7ae980186caa7a955a3a6e00e2074f1ca6036b0de4d24f58ab6fd08d

  • SHA512

    fa54d9b758da2c0f4ccb8b4f096b25820873e1ccf943a6dc8e003df5f35b43a4f532547461c6fd71493563cb0f53fdc4a355673ad137b946c1f55f91ffd1b592

  • SSDEEP

    3072:8MGiPYYh0ZXr+7DxNUbaxIcz93bOButK+ZAok:Mr+7DxVh3bHp1k

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\mouze.exe
      "C:\Users\Admin\mouze.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2704

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\mouze.exe

          Filesize

          152KB

          MD5

          e6031fb565f8ab99741693682e9abd09

          SHA1

          93ed7ebbe025d7dc9fd31705b6e663574b103772

          SHA256

          6ed8f3f900948ddd242e7c9e291b38c5fd08866e3c26ec18d7082af10eb4d21e

          SHA512

          12f7c7f153424b1d4df0795805d49c485ba9400822d34cf54a98bd4705c53518777be6944d7407e7d94740262a41c9c88d0e3856cdc7cf579139ff4d038bf8d0