Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 06:34

General

  • Target

    3e559c8f95b29820d1bc3cea590cb308_JaffaCakes118.exe

  • Size

    156KB

  • MD5

    3e559c8f95b29820d1bc3cea590cb308

  • SHA1

    22ea2814be84aa0ecf55d967524c39267577f0e3

  • SHA256

    bb21030113e118e63e4708174c7e6a1adc9fa692069d58840344d20a27fcb09b

  • SHA512

    9063aa0b369f7aa75c3af8bc7c5db499d13a087a8f7aa07ba574c134252631fb5b501f5f78cfd8ad73850abf6cc600345d8d20eed6344621bbb36223800e6863

  • SSDEEP

    1536:Mban4ngzp0B8PNuRe305Xrud5N9jRMmBUKH7zD87/u+JcBqVbv1BsbhbEle+RReZ:RogeIufubFKVXcBqB1BGSjNX

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e559c8f95b29820d1bc3cea590cb308_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3e559c8f95b29820d1bc3cea590cb308_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\paovuq.exe
      "C:\Users\Admin\paovuq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\paovuq.exe

    Filesize

    156KB

    MD5

    3501e86e3315f07132ea584b24b04450

    SHA1

    51e59832122dd4bdcdc365cda9afae5fd12e5299

    SHA256

    26e4ff3ba16231b9de5e1753260a700bf74a889d8b20789ea0b2b1bc231084a0

    SHA512

    239d957eb5429bd556780d349013e27edf1788a4e30d69b90a9dad4ec52fe0e349ecf2fd3b9a8e871e8a9746944b95e8e7d291637680d6138b86404a63855ed2