Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2024, 02:48

General

  • Target

    45744435889e919e4862028b7c8fede1_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    45744435889e919e4862028b7c8fede1

  • SHA1

    0884745cbf68e97ea351f7047864af9f7170101a

  • SHA256

    eb7041ddbc5768ad8c64e988ecf69a09d8fc828d3e4024b052f35fee80ca9f1b

  • SHA512

    974dc4fe96ceb8a57f9aff27e695e849e04e4b40df731e86ccbe3b1fe24a3a0cdb8448e3c332c153999563d5a646e13cdbcac68fef1d9656474fec454bfe4659

  • SSDEEP

    6144:q2bHpDuIqCHE28LuU4SDOZ+5H88EZeeSzbjnNu91uzqI/:q4DuxamSUDO4HfEZeeSLnA91

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45744435889e919e4862028b7c8fede1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\45744435889e919e4862028b7c8fede1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Users\Admin\qeupio.exe
      "C:\Users\Admin\qeupio.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2696

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\qeupio.exe

          Filesize

          228KB

          MD5

          6566bc20586f939fbdf6d245c47d466f

          SHA1

          e4392bf2841dde475932a3d1acb5008dc871f45f

          SHA256

          935cb4e6a3488c325534dec11caf093adbb94e20616b331dd2ba4a92ba4f944c

          SHA512

          d4e1c68a07d222d3369b2faa1866de278113cbd7ffd586c1d3cccc0356e5cf870a1bf79fd61d9160b5297d577a5acad08c41607856bcb467afde76080fb645ab