Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 01:27

General

  • Target

    9f0b859a757d8415d19fa53bda0d1c57_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    9f0b859a757d8415d19fa53bda0d1c57

  • SHA1

    fda8f94feb816f1f0016cbc31b33aa68777afab1

  • SHA256

    c924729c07970363a1f04c4f1f55dd77e882fb81cef042cd26aabd676d00dff4

  • SHA512

    86269122008b3725a9a3bf0d7256031c32a85320a900c0ed5cf76fe9cb256ed9701062aa96607d09a789078eb2f497d2f6048e4cd0224efdfb4a85e1c6e3762d

  • SSDEEP

    1536:7FTkQFqSpy8tXG06YpqdXTsYJ/F+FBFIFGFYF7DUZxTZk/a:dcSs0G0mZJC

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f0b859a757d8415d19fa53bda0d1c57_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9f0b859a757d8415d19fa53bda0d1c57_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Users\Admin\coeiqan.exe
      "C:\Users\Admin\coeiqan.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\coeiqan.exe

    Filesize

    88KB

    MD5

    007fe8280d5af6eb8919b72883cb3ea6

    SHA1

    0cf8467a7bb21c258f6f330910c38d95bf39f765

    SHA256

    d5cd6002a513e87d797d9d367bd21b5b0218ea6fd38c001b6f582fae8331d826

    SHA512

    f68ff6778aacb7fae61432cee0f829cdeaf8884c9c6e738f6278c742a7ecfd06cfeded0bd5419a52c4a1e73e682cd25202355ff5b093e6b35df647c68a459115