Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
296e2ba5d626af49c2d8c046c59e62e7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
296e2ba5d626af49c2d8c046c59e62e7_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
296e2ba5d626af49c2d8c046c59e62e7_JaffaCakes118.exe
-
Size
142KB
-
MD5
296e2ba5d626af49c2d8c046c59e62e7
-
SHA1
4de28ca7849c0bc8c4d829e9394bbd78494b66f6
-
SHA256
b1a379c0237b8accc29ffa400ce125868e6438bbc335092479e07f9b2cf775a4
-
SHA512
b377c44fd55705e0c6a16f58e80d48eff421b4f83d04e1de0586a21584c93d77f0626e5cb82ecce711a723ff4a6677f9166cdd82a3fd3c529c3c80698a569234
-
SSDEEP
3072:a0XG3vfZ32F0j9KQcJJ78IrDlq2RzFq247DCLTzltNSFN9b23y0PEOmuHw794rKM:aeovxmaj9KQcJJ78IrDlq2RzFq247DCo
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kauute.exe -
Executes dropped EXE 1 IoCs
pid Process 2156 kauute.exe -
Loads dropped DLL 2 IoCs
pid Process 2924 296e2ba5d626af49c2d8c046c59e62e7_JaffaCakes118.exe 2924 296e2ba5d626af49c2d8c046c59e62e7_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauute = "C:\\Users\\Admin\\kauute.exe" kauute.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe 2156 kauute.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2924 296e2ba5d626af49c2d8c046c59e62e7_JaffaCakes118.exe 2156 kauute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2156 2924 296e2ba5d626af49c2d8c046c59e62e7_JaffaCakes118.exe 28 PID 2924 wrote to memory of 2156 2924 296e2ba5d626af49c2d8c046c59e62e7_JaffaCakes118.exe 28 PID 2924 wrote to memory of 2156 2924 296e2ba5d626af49c2d8c046c59e62e7_JaffaCakes118.exe 28 PID 2924 wrote to memory of 2156 2924 296e2ba5d626af49c2d8c046c59e62e7_JaffaCakes118.exe 28 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27 PID 2156 wrote to memory of 2924 2156 kauute.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\296e2ba5d626af49c2d8c046c59e62e7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\296e2ba5d626af49c2d8c046c59e62e7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\kauute.exe"C:\Users\Admin\kauute.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD5317f5f93e05de09d8fc811ecddaf2872
SHA1eb88ada4fa9b8c697c9655ae96b36ef8af1ced11
SHA256a75d9ed2fbe2147846e3e88c916eb68e81a2d8a9c1b3fed4a103dfef558d535d
SHA5121c7f2c12acf9e3c5bedeeaaeefb293a9fed404ea8bd963df476474903bd2a3794a42691e49306e878a92a951a8ba794122bc76df368df8bcc367a58918a1f9ed