Analysis

  • max time kernel
    149s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2024 15:19

General

  • Target

    fc945247441031965a6c89803801e0cb_JaffaCakes118.exe

  • Size

    360KB

  • MD5

    fc945247441031965a6c89803801e0cb

  • SHA1

    7556af6d7fa648d066a4bb02408242f9701627d5

  • SHA256

    50354aa1c149df5e7c75ff12fcd9cfa62fa45fa256165aefc20b66e34ff9f56d

  • SHA512

    b45c8c873091017e8ffe529cf2d3056d436068c15d9a236a3439563f961d892d57b5a798bba9d31fdd6e4de5fa2007716a1e872d8bb3e17962af6a914c88b4f2

  • SSDEEP

    3072:jm6/YsB98mlS3tEXS/xDLYqpJRHo4Osl3agRYlzvvGvUDoBEtazeV5bo9R:iPsBP/S/xDLYqpJRHo103a5o6tazeVUR

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc945247441031965a6c89803801e0cb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fc945247441031965a6c89803801e0cb_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Users\Admin\dlbuug.exe
      "C:\Users\Admin\dlbuug.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\dlbuug.exe

    Filesize

    360KB

    MD5

    363d4498bd35e7358d9716f8ec38538f

    SHA1

    e2f2efab45ed99fe5f56079f5845a8d85534da0e

    SHA256

    4d5d9f803e4f19620b5810308bf0bd2c225961a85f675fb665a2ce3b7877c8fb

    SHA512

    2e50cf3dc44a1aff24dac8864dc51b6cfdd249fb4b9bbd5de52503a4d547c78bcb1595269feeee0a58160391f3efc7fa7c74a75e3db277443ce7bbc7364b4c0c