Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 11:23

General

  • Target

    3f905656812017d399700e6fcac921cc_JaffaCakes118.exe

  • Size

    188KB

  • MD5

    3f905656812017d399700e6fcac921cc

  • SHA1

    e716dcd776dbeda7af45ec223dfbc5d77500565d

  • SHA256

    6422991c18342f7b54a0bfdc25b61f9b364ec65d3b01b6662fc6603535489dcf

  • SHA512

    c4a4f94e91e5ec46e5b8a22ca26b913932a990fcbca66d2ca77c8bcb1b1e9480ed771730da8642f872ad43ed1eaba90b2eaa71b1c052e2cfcf7c7e2855a80358

  • SSDEEP

    3072:9cJchlwq2DZhv8yapZIvcFeqoSeaX/m7bfTWan9LxJ8DJOpPVKuqmqTgwa9MTXKE:4c3cZhvzWevcFe/aX/m7bfTWan9lJ8D1

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f905656812017d399700e6fcac921cc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3f905656812017d399700e6fcac921cc_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\qeuqe.exe
      "C:\Users\Admin\qeuqe.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qeuqe.exe

    Filesize

    188KB

    MD5

    7f7ae9aa4957b286c6cb438885e7474d

    SHA1

    f0e94a38ceac680534795a9bf1015b82312597f4

    SHA256

    0e708952751c7376b9f28adc2cf9fd0a58c162f271ed7072542484049f845679

    SHA512

    0b73a94bfe85ac28809bb67eb0d9682d0cf3e636ebaf3fea1eb242ef4e2c16adebb8c0bf959714da77db9b81407e2bd6391f2641837eb0400e1bb343b7b5e093