Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 05:35

General

  • Target

    fde4dff83b4ce952b42e204bff10ca86_JaffaCakes118.exe

  • Size

    216KB

  • MD5

    fde4dff83b4ce952b42e204bff10ca86

  • SHA1

    04e1e51e4c0d11452c84449823f785cbe09c3fe7

  • SHA256

    6299ee8b7cee933ce050de9d9bd3afd5b3358169e14f342f925d638dcf944a43

  • SHA512

    68ccd8b16342446a7c8c393998f1e853566ddbdfe9911589a7f1e2af0ac12c1bcfcb08ec33641a1cb007bc5ca03f701bac9ab15eb61e20dd9ac49182939030fd

  • SSDEEP

    6144:miOn0S7F+9rorhkPkr0bT0ckLaz/RJeIaAuiIv4wg9WNltq1QQIO7gTxZf/wD:miOn+9bT0ckLaz/RJeIaAuiIv4wFNltU

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fde4dff83b4ce952b42e204bff10ca86_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fde4dff83b4ce952b42e204bff10ca86_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\houuca.exe
      "C:\Users\Admin\houuca.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2616

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\houuca.exe

          Filesize

          216KB

          MD5

          a42bde372e612c3051fdf109b741a74a

          SHA1

          aa3e050439d551827751779ea4795da01fbf6f21

          SHA256

          5ed9d1771f31b4afcdc2b4ec0df631af57eb4ead0ee1e9ab0cb3b9ce52588c6a

          SHA512

          a42a045c4e2cb6c98a06042789db51fcf8262a912e7847b2b674581ca4f3116b1b514e5eb8a96089de45fdc135a5c3c16940622633ce3aef3db340b96112627f