Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 05:33

General

  • Target

    2bc5f514f5d7efbcd719c99eb5832c4f_JaffaCakes118.exe

  • Size

    76KB

  • MD5

    2bc5f514f5d7efbcd719c99eb5832c4f

  • SHA1

    0062ec9063ba8ab76b53da60b83e85866b5ddd39

  • SHA256

    19ab8433a03a439a320cf7a7eab55a8fd80e5afe41ec4c9c5ca6603bd19af8a0

  • SHA512

    c2a9c33c10bc0796d5281b69c8e7c413e7d2628ec40afebee438876b561878aecdd37a37068ab0974a96dc65eb008d88d097bed12bcf91183380fe8f9633f6e7

  • SSDEEP

    768:cQ6VvM1MMnY+1j4I4SccFhqmvdgxXGcZDxc7mdKnI/:cmnV1U2c+qHhPZDW

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bc5f514f5d7efbcd719c99eb5832c4f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2bc5f514f5d7efbcd719c99eb5832c4f_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Users\Admin\Admin.exe
      "C:\Users\Admin\Admin.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\Admin.exe

    Filesize

    76KB

    MD5

    3857999fb2d22f74742f5d375e4acce5

    SHA1

    4145467b4eb16223a1f4fc3583a98c93bc6cfcd9

    SHA256

    446c2c4956b26e074f8ce1d674b0fd7586b10b870a7a57cc219207c859c91a1e

    SHA512

    d3419702d43628bd56895c65be715b3ddf7298c6aefa94540c06f92e3db70d5f58c1b0575cf08c2934a85454251c8026017b8354533a2a7c7439fadfe42fad52