Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2024, 04:27

General

  • Target

    45d63e52af17046626591f038378c47a_JaffaCakes118.exe

  • Size

    116KB

  • MD5

    45d63e52af17046626591f038378c47a

  • SHA1

    3bf27ccc2a69f2084ff479093d459045b01592cc

  • SHA256

    c1a9b807d442f749cec1b9257c6e598e2cdac0c5237189e3452ddfd84a75eb7b

  • SHA512

    ba1da6e4ecbd4459c375406a43d8dcb3ad1f9b956a31b255f9dd5b4429e5ba4d76b2c5ad78c7b6236f40271862abd1f6104a408be6d241b79d382ea1ccc36d35

  • SSDEEP

    1536:1GXuJIDBeZjhtFgGjtXDTto2D9uCLBCPr8/NL44PerViI8kIi/p0:weJyeZj/FgoTq2lr20

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45d63e52af17046626591f038378c47a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\45d63e52af17046626591f038378c47a_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\keakol.exe
      "C:\Users\Admin\keakol.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2352

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\keakol.exe

          Filesize

          116KB

          MD5

          b5cdfdc00def7b2ee3eb1e15a4875989

          SHA1

          95a71107898c9a54bbed595a6af20828fc2a2e1d

          SHA256

          84321f95a63f49199537675037f8ce010d30b11d53535893301d7c1e83df7428

          SHA512

          bbbf74304de6417347ae5349eea3f40f6735065e9be4eae2d0fb2c160776f3a6d1686ef836b3519217e82a4022d201e30f3b29427aeb5f23006aa1f7d84ba6c5