Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 10:17
Static task
static1
Behavioral task
behavioral1
Sample
e24f2ac8a451a1c070167f9a82390266_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e24f2ac8a451a1c070167f9a82390266_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e24f2ac8a451a1c070167f9a82390266_JaffaCakes118.exe
-
Size
140KB
-
MD5
e24f2ac8a451a1c070167f9a82390266
-
SHA1
3768a396246cc12ea122c0b954641bf9d6d36795
-
SHA256
d9fa0d3ba3bc5183c35b24116f5f798e7a9caa0afbfd3d2347a288e4946e7925
-
SHA512
53cfbc90fd98eddcfe2d50b85d694eb0bb0d691247470626f0569b186b80ffec47415f1dee02a66a4cf477d1c9b5534991f48a795127ca557c4fe38d457efa3f
-
SSDEEP
768:z2P160yt4pd04q0zik+vhy7g0EM/LinbQO+snmWv:6tveEn3+pCg0EUGQOrn
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vaahes.exe -
Executes dropped EXE 1 IoCs
pid Process 2544 vaahes.exe -
Loads dropped DLL 2 IoCs
pid Process 2756 e24f2ac8a451a1c070167f9a82390266_JaffaCakes118.exe 2756 e24f2ac8a451a1c070167f9a82390266_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /U" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /C" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /B" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /x" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /Q" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /P" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /E" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /O" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /Z" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /j" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /A" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /X" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /t" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /W" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /n" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /e" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /K" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /H" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /g" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /l" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /N" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /M" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /d" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /h" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /i" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /w" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /V" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /S" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /u" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /c" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /Y" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /a" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /y" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /p" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /o" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /T" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /r" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /s" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /F" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /f" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /z" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /b" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /k" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /D" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /L" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /G" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /m" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /v" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /R" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /I" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /q" vaahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaahes = "C:\\Users\\Admin\\vaahes.exe /J" vaahes.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe 2544 vaahes.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2756 e24f2ac8a451a1c070167f9a82390266_JaffaCakes118.exe 2544 vaahes.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2544 2756 e24f2ac8a451a1c070167f9a82390266_JaffaCakes118.exe 28 PID 2756 wrote to memory of 2544 2756 e24f2ac8a451a1c070167f9a82390266_JaffaCakes118.exe 28 PID 2756 wrote to memory of 2544 2756 e24f2ac8a451a1c070167f9a82390266_JaffaCakes118.exe 28 PID 2756 wrote to memory of 2544 2756 e24f2ac8a451a1c070167f9a82390266_JaffaCakes118.exe 28 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27 PID 2544 wrote to memory of 2756 2544 vaahes.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e24f2ac8a451a1c070167f9a82390266_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e24f2ac8a451a1c070167f9a82390266_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\vaahes.exe"C:\Users\Admin\vaahes.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD551a6420a19ac5ad4c5665add138ba0a8
SHA1bd7bce137d947691f383a2577d68ba0562105dd2
SHA25624824637443ef1624fc306425ca0c738bad01ed9d513286f8427cd797418347a
SHA51213421bea7273995221b6de3ceba61277f2ad383e4d0c44fb057abf53762c478bd83b1698d50196c6c4e491b9648bafe4f1df927052168293268a66e895dac91e