Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 10:16

General

  • Target

    00d039cf8b166cc5d8f378a2bf991c2b_JaffaCakes118.exe

  • Size

    68KB

  • MD5

    00d039cf8b166cc5d8f378a2bf991c2b

  • SHA1

    eba6e855b415d95f9ead2ca65e705d29062c0b01

  • SHA256

    c98bdf3a6a47fcbd57360b67694404e468a01776d3372614d4973bf9987720aa

  • SHA512

    24642a1e146153d310a378ebc929648627f71c4aab313e43535b9b62a84cdd87af73d4fd5a31bc82c4e801b605498b1cef2f8bf5777617fd6518bc392915b87a

  • SSDEEP

    768:hc9liTduuAl+qOQSgFrhKo//WomvdfQXwYt1IEDIefZsK:u9IxdAcqOK3qowgnt1d

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00d039cf8b166cc5d8f378a2bf991c2b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\00d039cf8b166cc5d8f378a2bf991c2b_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Users\Admin\Admin.exe
      "C:\Users\Admin\Admin.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Admin.exe

    Filesize

    68KB

    MD5

    f613c3bf9ef053cec08471ca9c5fcd61

    SHA1

    033463e6822842305fe244223a7a43fa1d18ac44

    SHA256

    9c6413446b7cf55f00077b11fc41cc6787e67b769d25a6ffb272a3103af15274

    SHA512

    a98300112ed45fdbc1473b6bd4058e1e60e673b04153abca17a05bf8e59d152481e6318f889a67bee51d4dcdc4b8cbcbfb49f2139fcf6bac27c704d50f3485c7

  • memory/1524-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3244-33-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB