Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 08:56

General

  • Target

    1705df19e5e061932ac21414f354e68a_JaffaCakes118.exe

  • Size

    152KB

  • MD5

    1705df19e5e061932ac21414f354e68a

  • SHA1

    61ca5a06e32ce2fb70b827367d0d45b50ee67bda

  • SHA256

    c67190dbc53b97cc99909ba62a7375a1d02a7e6a1aafedfc467eb08e429eac13

  • SHA512

    448c0c56dbb990d00326c9fd97092ebe38ed2d96f9e955f20903bd40d6b08d5a2f95e563ff16deb7a9cadf7ca38b919f36b51dfb9486ee8379c3bc3490b0fa4d

  • SSDEEP

    3072:RMGFPYYh0ZB+7DxNUbaxIcz93bOButK+Fol:2+7DxVh3bHCl

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1705df19e5e061932ac21414f354e68a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1705df19e5e061932ac21414f354e68a_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Users\Admin\njdil.exe
      "C:\Users\Admin\njdil.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\njdil.exe

    Filesize

    152KB

    MD5

    bfdab7f3696fe88a981e7a21d6d65552

    SHA1

    30ab87a008ecaaabeca4fe6e2ffa55ce3360a256

    SHA256

    5f0fa283e816563f3b56218c631b11d8d79c856eb6ca6b4fd578b4aedea59cb2

    SHA512

    59ad2a74889f8bb8318291258ce8f517ad97b54ba4432928fda4bcf4f09bf344aaf9f9f998d65cfdf60e7bc27c2de436628df451cf0bb1c135f3508463e5b9cc