Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2024 16:41

General

  • Target

    be49c3db02172a57edef42f47d9388f0_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    be49c3db02172a57edef42f47d9388f0

  • SHA1

    cb93dd19a2a4ce451fef5e2e97d6d9e4ce3fbbe7

  • SHA256

    74aa53ef9149a07d4a1572f7c540fe0cc6d4224c2f5e785c0933601703943485

  • SHA512

    98ad17d3099cb1e6310ce9e47857a3232ea6a714c9cf371bce529c33df6c70f4df47fee202cd5a7a76b7b117146bc229be68e381778568949063a1d69463b5af

  • SSDEEP

    1536:0ym4G/TriqH6rM2qEbBkIvI4DyQDIws/HmmYbRdfuL0wo7JaS1:xG/TtH63qEbBkn4e2s/HmlTfdwQL

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be49c3db02172a57edef42f47d9388f0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\be49c3db02172a57edef42f47d9388f0_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\cxlud.exe
      "C:\Users\Admin\cxlud.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\cxlud.exe

    Filesize

    132KB

    MD5

    ddd3cc685bf242923f082d9378d4fdfc

    SHA1

    7845c10267e0fa05148800a27262ca02b1a1972a

    SHA256

    d8d446845b19945d52f2804fc2eac062efb0ebd9c0f3e9b36041305bbacce918

    SHA512

    2f60ba15f9d1f74822d844bf60c30082f8f74be315bdcf090578e6f7c063e982f158848940395a9421a6042fe118b098c5331f8b2e8f06231436caa0711dce41