Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 02:43

General

  • Target

    fb58bfe7c7728d2befc2349f4d22e14b_JaffaCakes118.exe

  • Size

    280KB

  • MD5

    fb58bfe7c7728d2befc2349f4d22e14b

  • SHA1

    506b815295256dd3a13e6cfa8a0ca37141f45e01

  • SHA256

    46943ee042938d171dd3afa8db0bdae82a8d45dc7b419681b4c18eeee91a5fae

  • SHA512

    09295da109fbb47be247a9c05c6dab01843326bdd0b1b4abef0fb8d01694efb7d67304085e89bfe1c5476f2da83553a7c92950f4fbe12bfe292b5484978cd12b

  • SSDEEP

    6144:SIIIpydVsZyxyK5R8GYKi1Xfvs1tzH51t+ewSReXNX/:SuydfiebOv

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb58bfe7c7728d2befc2349f4d22e14b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fb58bfe7c7728d2befc2349f4d22e14b_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Users\Admin\ruehoil.exe
      "C:\Users\Admin\ruehoil.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2704

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\ruehoil.exe

          Filesize

          280KB

          MD5

          5d4a612c5dea5bb0cb891c276e3c5904

          SHA1

          d1e4ef65771a8fe136f37a1d27c829a9416f2f75

          SHA256

          54e17beec4f22e9adf7a688bd6ab2bf50d206a7b29a1759d1992fb7b1334efb0

          SHA512

          8e0856ce06b1d872c33300cde95f3d2b57ec3f8663c764491d81141f6900a4ad402bd7b87fec3aa99bd44ee625632e8d0265b8b500843aee5d2b30c0c30b9a4e