Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 05:02

General

  • Target

    3884c3e4471e4aada5acd185e2409d96_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    3884c3e4471e4aada5acd185e2409d96

  • SHA1

    0551598861b63a55cf33c0074b9c326d5f9eb073

  • SHA256

    ac6caefbc81aa327d022b57b28b962cfcd52cea30e411b105e56d083edcbcc72

  • SHA512

    74845840d18eaa063a88e4033d779cf9077402a892295e7db9abc87142873766ff32f1f96aca6d0a9188009c349778bdb0b8d68b2113a80c3d39797495d282f6

  • SSDEEP

    3072:cDCbZSukOY8hrJFVNM/N/5sfqDfwqyne+:6ork6hrJ3NON/5sGSe+

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3884c3e4471e4aada5acd185e2409d96_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3884c3e4471e4aada5acd185e2409d96_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\cuote.exe
      "C:\Users\Admin\cuote.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\cuote.exe

    Filesize

    132KB

    MD5

    01422580a14f8a71e0e19ea5723db1a1

    SHA1

    7175717d74517366f39e06520fc69b9a41785c60

    SHA256

    5e33ef0ccde0af5b4fb7c00d9bbe5ef7571da3637d34a8e1bbd5a16b6aea8d6f

    SHA512

    783666b061442629d79b3e41b4d762d0b96fb8f7126cb8c77b9473e66b9e4a8d7871f3cf2b3742940090458d28015ab0545e3a935080573ba0e678b2dc49e82a