Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 02:43

General

  • Target

    15d9ac33ef3cc8b0a1056c736a24fda0_JaffaCakes118.exe

  • Size

    288KB

  • MD5

    15d9ac33ef3cc8b0a1056c736a24fda0

  • SHA1

    9d691783e39f7aa428c3935ba1c69c31d25afbc0

  • SHA256

    bf895b4b509594d7107163f10c0f160b80d8f1cbe926649006545badc3afa8b6

  • SHA512

    ace19614144c3bf7dedb3a99af2cab8328a698bcdc42566cdf9dca575393a0ed65f578c3a66b1d75e11169e50b757710cf5e368f16d2e093106f7a0bcb65095e

  • SSDEEP

    6144:UWyi1vbGuOdn9Z/QmO6Ckobf3fGCmahGutEU:l1vbGuYnXQmO6Ckobf3fGCmah8U

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15d9ac33ef3cc8b0a1056c736a24fda0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\15d9ac33ef3cc8b0a1056c736a24fda0_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\vmcuof.exe
      "C:\Users\Admin\vmcuof.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\vmcuof.exe

    Filesize

    288KB

    MD5

    fef69096398f0ef4034bbaf9ebc52ff7

    SHA1

    8505a0ee46fd361404295b5271abbf7621954e49

    SHA256

    fdc809b1cf59d66a7f2771dc4a73d52fd05e89255553b0dd9e09d400b1a416be

    SHA512

    019508659d76a4c325e4f7095c8fe29a502e3ea57029c27297583b8d214f1df34584ccdbea95a78b7fcbcdec74f6e96d4aa7dbb9dcd83c9603db522b92e9ee7f