Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 01:27

General

  • Target

    9f0b859a757d8415d19fa53bda0d1c57_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    9f0b859a757d8415d19fa53bda0d1c57

  • SHA1

    fda8f94feb816f1f0016cbc31b33aa68777afab1

  • SHA256

    c924729c07970363a1f04c4f1f55dd77e882fb81cef042cd26aabd676d00dff4

  • SHA512

    86269122008b3725a9a3bf0d7256031c32a85320a900c0ed5cf76fe9cb256ed9701062aa96607d09a789078eb2f497d2f6048e4cd0224efdfb4a85e1c6e3762d

  • SSDEEP

    1536:7FTkQFqSpy8tXG06YpqdXTsYJ/F+FBFIFGFYF7DUZxTZk/a:dcSs0G0mZJC

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f0b859a757d8415d19fa53bda0d1c57_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9f0b859a757d8415d19fa53bda0d1c57_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3124
    • C:\Users\Admin\kauvu.exe
      "C:\Users\Admin\kauvu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\kauvu.exe

    Filesize

    88KB

    MD5

    d10b83b39f8ea38b459731adb1a75d59

    SHA1

    8c4781e1e0c9c15255f97182e66806031540c07a

    SHA256

    9649b486aac8dfc7e4775e2cc93f20b1b252fd92ab68d0f73239faebfbab425a

    SHA512

    710d475cfcb68779ff866fa5fefa2b3bb452d4b9f1fc52283e5b10c6f9917fbf171b0237d6a7d744b9651a100c5b624139120c47ac1fc91b235b1182e83367e9