Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 11:42

General

  • Target

    0122e382595e14663b3ad6ae8cd59b01_JaffaCakes118.exe

  • Size

    96KB

  • MD5

    0122e382595e14663b3ad6ae8cd59b01

  • SHA1

    13ad0302f28510fa95961ab1fb07b412ff4e65f6

  • SHA256

    742b639a44e002743b55b7f8f859a796aea508fd595405ad0a97e60efed8eca0

  • SHA512

    c2441d795a46bd2c3f7a4a94e2c0ebb4b95941477c895a1a8a330de71c13e9a84c7772bc3044637bf7dadbfb1771499d34079d882beafe023d7ffbe35a061004

  • SSDEEP

    1536:ZsQBHzf6cO/hJqCkGulSc16l6u+NMMl/KlYv1Tq5ThFjNIj/:VIhElu8CFFjC/

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0122e382595e14663b3ad6ae8cd59b01_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0122e382595e14663b3ad6ae8cd59b01_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Users\Admin\qicox.exe
      "C:\Users\Admin\qicox.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qicox.exe

    Filesize

    96KB

    MD5

    f7de17b77866aa57694f116b8c6b5c29

    SHA1

    76294045007b57ccb37299f7714974a0e4868537

    SHA256

    7452d0578d94396948f3b7a555e1a2a83dabafaaef446c19a8e6421c50bbee43

    SHA512

    20370e950409d7aa4a601cb8cdbc3483035ede2ad8270e58662fa664a4c7c428a9363a802a048760c4e5a021dbe916ee13114e0ee6e1710de770c4e612658adf