Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 01:00

General

  • Target

    03d5c0f5a395118947911dede6eae937_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    03d5c0f5a395118947911dede6eae937

  • SHA1

    1ebb06efc7ab311399d0c950fc8d2649abbdd38c

  • SHA256

    58ca5eed304316c7e9491c7052c0293987abd9910796e7788f4df4514dc7cc22

  • SHA512

    69da15391fe86bb7f56832fba2a58752c2ca5e2577cbda040d5a44489ce9de0e2a785b4338252781a687ee95a53e8acb70270f4e1302a938a9e02edee1dcc707

  • SSDEEP

    3072:wu8+n803OBrpM3lt0bqO4deKIpS2Q9tC3UwtxaTSGzGXDzp8D8OJbhaDge3ogg:jOBr63cbqO40K394aTSGzGZ8ogcYH

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03d5c0f5a395118947911dede6eae937_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03d5c0f5a395118947911dede6eae937_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\cuyah.exe
      "C:\Users\Admin\cuyah.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\cuyah.exe

    Filesize

    192KB

    MD5

    53a4987bfa84dab4d273e682c8067da2

    SHA1

    bac491145d5a94aef03bed7eedc7fd679bf4538a

    SHA256

    7a6e55e7b15ec6d4cca0ffed95b5c4864ad6ca8cd7570d34f648fc174b1dee15

    SHA512

    db5beaafde3f17945a8dbf543aa57995e0cd41a480f937c3c94fd29bcb72f466c94d242ff1ef2e378df02db632f46bcda1b0479ebdc53e61690bd7d511732f2d