Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 16:41

General

  • Target

    be49c3db02172a57edef42f47d9388f0_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    be49c3db02172a57edef42f47d9388f0

  • SHA1

    cb93dd19a2a4ce451fef5e2e97d6d9e4ce3fbbe7

  • SHA256

    74aa53ef9149a07d4a1572f7c540fe0cc6d4224c2f5e785c0933601703943485

  • SHA512

    98ad17d3099cb1e6310ce9e47857a3232ea6a714c9cf371bce529c33df6c70f4df47fee202cd5a7a76b7b117146bc229be68e381778568949063a1d69463b5af

  • SSDEEP

    1536:0ym4G/TriqH6rM2qEbBkIvI4DyQDIws/HmmYbRdfuL0wo7JaS1:xG/TtH63qEbBkn4e2s/HmlTfdwQL

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be49c3db02172a57edef42f47d9388f0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\be49c3db02172a57edef42f47d9388f0_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Users\Admin\jaodam.exe
      "C:\Users\Admin\jaodam.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jaodam.exe

    Filesize

    132KB

    MD5

    44601da75279ce7149f0da448c000262

    SHA1

    a15cc4deba369f17b59ac76d08b2008057f5cfe8

    SHA256

    a5a759365306c31930ef17b275d87ad951c628f0cb226e7e8ceb85d9a909eb03

    SHA512

    3663ecfd82dd32c994fa5c1e5ad2b563dbc8d8e03519f3cd6036b8bb986939bece2be23ffae352c2ffe8d74c4b7c43d01f03a8183fe17e4fbd26f251baa2d840