Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 08:35

General

  • Target

    5671ea63501167a6ca46a9e757a59686_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    5671ea63501167a6ca46a9e757a59686

  • SHA1

    9e2202e040ecaf88f4e852675fdbadffe45f7a40

  • SHA256

    e387ff9fecbcd2a404d1dc5c2fcbc47dcf62671f99e8f25ee8f02c025534366b

  • SHA512

    7aaecab3c65d04d0c2705ac6d96b7b28e4b65a83c359b589a7365ac62bd6e47ed8514249c6d8ad2f2c79b73a29a080eaa99b0541b838b054fc78e73ee3dbafc2

  • SSDEEP

    6144:UQ0e9bEeUsviYNFYOybLBzt/VkXjdJl5dJso+YsG:UQ0Obp5qCybP/VkXjDjdov

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5671ea63501167a6ca46a9e757a59686_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5671ea63501167a6ca46a9e757a59686_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:412
    • C:\Users\Admin\qoojoe.exe
      "C:\Users\Admin\qoojoe.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2284

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\qoojoe.exe

          Filesize

          228KB

          MD5

          4c6ecee6fc0d59b7be83afc5ee2ef4f4

          SHA1

          a0be1b973ed98f2e0675dd9ce2d47b47c7d76bed

          SHA256

          f469a4ca0f92b4d16f5e70a48b334dcd3ef6fb4e813476cd851d2b46122b7dfd

          SHA512

          ce52b3ce91ad6629408285b90370edea926db725ee2ecb54faea7fe7966322cf83bc281bfdd5bacf8ea4d8998d20167ad7233d13b1360e48eddea71f29fdb558