Analysis

  • max time kernel
    149s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 00:01

General

  • Target

    0d017d6a6f63df1e53bb481ed1b3fc9d_JaffaCakes118.exe

  • Size

    168KB

  • MD5

    0d017d6a6f63df1e53bb481ed1b3fc9d

  • SHA1

    c51d555abf5d40d731454ac2bac3fb3092dd709b

  • SHA256

    ed2d90f43fabb7b8c56e2fe313c453431796a9071f0da465c19b9a758e9c59cc

  • SHA512

    5fe39b30d4870ca073f45040067d496d59a462aa737a65b9157b8f4f9a8cabf4ee74e6c7d36d03cad53817e52d82b2a87bf235eb8c8ce72eeafa1bc0e3695d15

  • SSDEEP

    1536:cjsulp5+eroCqSaWi1BmQT8gEA2ibO/aDyrOt80BRU1sHzsNfB5R1Rc06v:q+CzXlg

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d017d6a6f63df1e53bb481ed1b3fc9d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0d017d6a6f63df1e53bb481ed1b3fc9d_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\ceger.exe
      "C:\Users\Admin\ceger.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ceger.exe

    Filesize

    168KB

    MD5

    ed45e79d87c4c5dc2a85bf18aa4d3dbb

    SHA1

    4a9945e1bad0ee409e73c8fa6c6526efd9fba28d

    SHA256

    4ecc4d0b2b2e2d07e03ee93fbd67ac897eb27c8c700b488c83fbce971874c443

    SHA512

    d475882c316e43765f0a116624822bd46fbd5ee817dd1801952c35c37b1f127464c216092f799e7eb272525afed609195be2ff9f542be5e0140352e3ef8d509c