Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 11:23

General

  • Target

    3f905656812017d399700e6fcac921cc_JaffaCakes118.exe

  • Size

    188KB

  • MD5

    3f905656812017d399700e6fcac921cc

  • SHA1

    e716dcd776dbeda7af45ec223dfbc5d77500565d

  • SHA256

    6422991c18342f7b54a0bfdc25b61f9b364ec65d3b01b6662fc6603535489dcf

  • SHA512

    c4a4f94e91e5ec46e5b8a22ca26b913932a990fcbca66d2ca77c8bcb1b1e9480ed771730da8642f872ad43ed1eaba90b2eaa71b1c052e2cfcf7c7e2855a80358

  • SSDEEP

    3072:9cJchlwq2DZhv8yapZIvcFeqoSeaX/m7bfTWan9LxJ8DJOpPVKuqmqTgwa9MTXKE:4c3cZhvzWevcFe/aX/m7bfTWan9lJ8D1

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f905656812017d399700e6fcac921cc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3f905656812017d399700e6fcac921cc_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Users\Admin\teouw.exe
      "C:\Users\Admin\teouw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\teouw.exe

    Filesize

    188KB

    MD5

    cada479b526d54b0191505adb5ff0a7f

    SHA1

    26eef7a0d57acf51374aeb5430f1676cff04cccd

    SHA256

    7d3c3f06872f06e57245220cb4d10b93e56aba3e8ab2778a2a464823160a3052

    SHA512

    26927796bec89d3c3b5ac7ad86c952adacbef64016970d7a59f93f6f73cfe231e3e44a382eda62a49afef4b8f70817e16d6629e6f75d507ff15a9669f75fc510