Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 05:02

General

  • Target

    3884c3e4471e4aada5acd185e2409d96_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    3884c3e4471e4aada5acd185e2409d96

  • SHA1

    0551598861b63a55cf33c0074b9c326d5f9eb073

  • SHA256

    ac6caefbc81aa327d022b57b28b962cfcd52cea30e411b105e56d083edcbcc72

  • SHA512

    74845840d18eaa063a88e4033d779cf9077402a892295e7db9abc87142873766ff32f1f96aca6d0a9188009c349778bdb0b8d68b2113a80c3d39797495d282f6

  • SSDEEP

    3072:cDCbZSukOY8hrJFVNM/N/5sfqDfwqyne+:6ork6hrJ3NON/5sGSe+

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3884c3e4471e4aada5acd185e2409d96_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3884c3e4471e4aada5acd185e2409d96_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Users\Admin\duahe.exe
      "C:\Users\Admin\duahe.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\duahe.exe

    Filesize

    132KB

    MD5

    1fa52ac8273ae7cb3d0ec9c3d510f2d6

    SHA1

    90cb1e6e10c3f5f9cdb8886494d486fd9508a1ed

    SHA256

    5c8ac454fcf4a66c9cac6a679e605d49adbaad40d45800fe0fe85552fc52771c

    SHA512

    77df988af857e7b5df9415ae7f272a843d8df9fe5e4c23eaa659c62aa04fa4ea6c070cacbb3bdfc575435d7c37ada09545e4b4b061cb503c8078a9b62b762d71