Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2025 03:59

General

  • Target

    JaffaCakes118_465cc7122ed67d887761ffa86ddc8723.exe

  • Size

    224KB

  • MD5

    465cc7122ed67d887761ffa86ddc8723

  • SHA1

    753e943e7946cb5b5cebda215dbfefea0ba2f4c7

  • SHA256

    a8f27cc5719cc09cf612523a60ee1e4d1423a266ab24b3d87f8059d8e1c6f69d

  • SHA512

    ae82f6ed7e86700c512534c46d7a55e4a3be9e3bb6b1dcb9a04e265778c48b81fce361d0ab64a24af18d418ce4e008c71cf408fb900efdce41a987d354c14435

  • SSDEEP

    3072:vHjk+0oLnWFnzBHv/xWFsg8WatFBGFVWPE5ac0pG/1z+QVMbg1jm0+J:Po/BHng5HaVG4G/1z+QVMbg1jv+

Malware Config

Signatures

  • Vobfus

    A widespread worm which spreads via network drives and removable media.

  • Vobfus family
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_465cc7122ed67d887761ffa86ddc8723.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_465cc7122ed67d887761ffa86ddc8723.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:1996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\AG58FPQON.exe

    Filesize

    224KB

    MD5

    0b3dd0136cafb3f0f711cc504a178e82

    SHA1

    c14849998477e53f26b6f45a51be2215b8642cb9

    SHA256

    fe333f5a0726998ef6fceb7f8e4dba3d6e8443ab0ca6f5137f5ae8f90bbdbca1

    SHA512

    5300fafac2267d549bcc0dff38b5bc7ff81dd88c59b8ec0d5928a496290e1aa763519c19748ac1d3413cd944a9a5f7fbad93ea68e585abf207f6f9c034ea6e9b

  • memory/1996-0-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/1996-17-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/1996-18-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/1996-232-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB