Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 02:56

General

  • Target

    29924917e3156e690c2e426d7766d8f2_JaffaCakes118.exe

  • Size

    104KB

  • MD5

    29924917e3156e690c2e426d7766d8f2

  • SHA1

    7810cb9a3d5f37d8076e559e693ad2ef3178f276

  • SHA256

    d9e0aaaf76c8a7e484af6e30e9240ed5a6b4bc3a89f5cc674ea6d65399359ae4

  • SHA512

    4e5591bcf0814b0c5cb290783cdd9a352d5ccb615ff78747ccf5ab938bf0b37c55e51f718b9f677da085756c206693840a53aa4082f9d599d57532967a8fc756

  • SSDEEP

    1536:NSBn2J8+xp+Q/fGnOmXdvSh2cQlIJ/dH/5QOuyXRRRyRAR/RwRDyYWrMktgFgzgg:1+I+QW2Qcx/f6y4BoDJ

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29924917e3156e690c2e426d7766d8f2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\29924917e3156e690c2e426d7766d8f2_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Users\Admin\ziavos.exe
      "C:\Users\Admin\ziavos.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ziavos.exe

    Filesize

    104KB

    MD5

    53f4034c40324d7a8f4d64f350bdb969

    SHA1

    b56452f29c7aecb5420af11d9419f499f0a9db43

    SHA256

    9c2769453a1417acde3bb1c1bdab81fdeab0cec648a76d20a5731fee7698d283

    SHA512

    1ca2932e9b049f650186fbab4b194db988e587b6de7f5e3c9762a1337347149039326f598b4dd285ffb2ee3e57556825ef3344fdb59e7058d636bf0ae3761b5c