Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 03:46

General

  • Target

    5550be418f64b6a5187e4ddeb3d009b2_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    5550be418f64b6a5187e4ddeb3d009b2

  • SHA1

    dac051a2f0a08665601e3894fd58dd6605a7bd70

  • SHA256

    87f13a9d65d2ed08574fe848b5dfcfda54f6368ac7035802fa8f88d733125394

  • SHA512

    9764a21279a851c8cc4bf72465285d4ccee3abcf71bc334d0911ab00297968fa504f77ea88f306cc4657813ef855553d61709951b1cce2dcc5c05b0c9083f553

  • SSDEEP

    3072:1WfMlXL6KvWeRl6Knvmb7/D26DKcAA6vQOm34lK5/si+yS3A:fX5VREKnvmb7/D26DKcV67m34E5/skSw

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5550be418f64b6a5187e4ddeb3d009b2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5550be418f64b6a5187e4ddeb3d009b2_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\mcweov.exe
      "C:\Users\Admin\mcweov.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\mcweov.exe

    Filesize

    184KB

    MD5

    413303cf8d1d79ba36f7b72f0d792e3b

    SHA1

    c0c3e786b80fbc2a0e05a9033da425d43fddd757

    SHA256

    f0d33a369ff5b4d40c7a41f14b4d05bfde4b13bf1f3c4624728b107f7eaf9b95

    SHA512

    ff321c256119c9fa0f9dbcd6740a3d3100d7a3a816df39d7757cc011f6b0458b2f1bb5436ffa0ae490698908c879ed68a1c0baa19174738ee02d10be3b49b7c4