Analysis

  • max time kernel
    149s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 06:30

General

  • Target

    04b1e2208f0411ee950efb0be8c2bb25_JaffaCakes118.exe

  • Size

    116KB

  • MD5

    04b1e2208f0411ee950efb0be8c2bb25

  • SHA1

    81c2447f131d2b80ad527947cc29afebcb5ea6aa

  • SHA256

    cd8590c8eaf0efbca923b6e5d540eadff24030007dbea3c1a0ec73e0e1eb7556

  • SHA512

    35213f5efe881b89cbad83d1fe8e0cc5f13a9157a6ba42792e23ba6d57cea39a7e1e6a541c9ce451a3d4892e4507b8ad619a1dcf255421b99ae0f5e4c304b619

  • SSDEEP

    1536:n0pxo8++D1hyo8Kw6KBOIW4Z8HO1Zwt0f4HeDUEdMOPy9sbgNLwo7JaSi:0p8+D1IofIr1ZNDUEdawQU

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04b1e2208f0411ee950efb0be8c2bb25_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\04b1e2208f0411ee950efb0be8c2bb25_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Users\Admin\seaqud.exe
      "C:\Users\Admin\seaqud.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\seaqud.exe

    Filesize

    116KB

    MD5

    17ba5a54477a13af320b9cfbfc55acf7

    SHA1

    8224107dcc02dfc446b8ad8c81045581d65acb96

    SHA256

    03563f82e32398e0dce4ec92c3cdba58fdd4f2f0962a60670f95ef1a1f90d93c

    SHA512

    7e27f1daa078b72e80e03e1c19a8aad316c3ddc10296a11767c1d7289b09aff8ff5f45134fc040addf74acdd9ffc575e97702941c8a340d26d48495862d0ba16