Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 08:41

General

  • Target

    05160f0b0039f0bca598e09032c720e0_JaffaCakes118.exe

  • Size

    96KB

  • MD5

    05160f0b0039f0bca598e09032c720e0

  • SHA1

    69d06086aae11135c355357a9b2d633051aaf843

  • SHA256

    9d3adf9bbd93454402aab73fd2cc5f4b231799123bc5c2f4c5845724a5c19f9a

  • SHA512

    65770f2d2f689b896ae21cad59caaabbfb64dae88761c6a15a2be62c73742b7c392d47584f4e28d7ffbfd9c2143a7e17d617fa23624b96b8d9448dcc1c422922

  • SSDEEP

    1536:bfEg52ebtyVQO8PXychWewjj3RJEEo/k3gzinynEkRldUEPjlijOewNIj/:DE/eUOychazRqEkMCRld8wC/

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05160f0b0039f0bca598e09032c720e0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\05160f0b0039f0bca598e09032c720e0_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\xoija.exe
      "C:\Users\Admin\xoija.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2736

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\xoija.exe

          Filesize

          96KB

          MD5

          f08344238ce0cd68d35710f5676ca933

          SHA1

          f26bc38d6f988a94033ab77c58b05f1803b9c12a

          SHA256

          7eec220657657af80bbbffc2d364f057f5199202178ec7a062a8eab199764b03

          SHA512

          df8ec60878d0543001a8967eec4161922a083ac2a55246d85318ebab21e995c90fb615b7a1ad0938e7d7d25be32b477b8632ee39d1ffbf45bad3b244206bad19