Analysis Overview
SHA256
18c6613792002a37e9ec93b449cb77b5d50c8d12e5fe3075b90d9a1660db2a66
Threat Level: Known bad
The file e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Modifies visiblity of hidden/system files in Explorer
Executes dropped EXE
Loads dropped DLL
Checks computer location settings
Adds Run key to start application
Enumerates physical storage devices
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Modifies registry class
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-06 15:10
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-06 15:10
Reported
2024-04-06 15:12
Platform
win7-20231129-en
Max time kernel
150s
Max time network
118s
Command Line
Signatures
Modifies visiblity of hidden/system files in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\mauwe.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\mauwe.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /l" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /j" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /r" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /y" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /i" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /d" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /s" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /g" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /u" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /o" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /b" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /f" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /e" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /q" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /h" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /v" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /n" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /w" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /t" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /o" | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /m" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /a" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /p" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /z" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /k" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /x" | C:\Users\Admin\mauwe.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /c" | C:\Users\Admin\mauwe.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\mauwe.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2880 wrote to memory of 2772 | N/A | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | C:\Users\Admin\mauwe.exe |
| PID 2880 wrote to memory of 2772 | N/A | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | C:\Users\Admin\mauwe.exe |
| PID 2880 wrote to memory of 2772 | N/A | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | C:\Users\Admin\mauwe.exe |
| PID 2880 wrote to memory of 2772 | N/A | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | C:\Users\Admin\mauwe.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe"
C:\Users\Admin\mauwe.exe
"C:\Users\Admin\mauwe.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ns1.helpupdater.net | udp |
| FI | 193.166.255.171:8000 | ns1.helpupdater.net | tcp |
Files
C:\Users\Admin\mauwe.exe
| MD5 | f914e0a06f5276067278c784cf0b018c |
| SHA1 | e31ec326bb12fd10f291981f80945157563899b0 |
| SHA256 | 69753bb91304c1fccdc454e88a54143a37b609eadcd284dd0313716e63ab5bb2 |
| SHA512 | 84f85c60fe637f16b72b6c32ca8470170b187228cb84190aba2c55486ec37ea8205c5e3dde28062660096c3b0b5e527d1fd5b44bcf8b943afc146a84eb5aa83e |
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-06 15:10
Reported
2024-04-06 15:12
Platform
win10v2004-20240226-en
Max time kernel
149s
Max time network
129s
Command Line
Signatures
Modifies visiblity of hidden/system files in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\roodiax.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\roodiax.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /y" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /w" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /k" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /u" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /b" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /r" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /m" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /s" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /o" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /z" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /n" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /j" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /p" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /f" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /q" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /h" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /d" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /g" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /x" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /e" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /l" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /c" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /t" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /v" | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /a" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /i" | C:\Users\Admin\roodiax.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /v" | C:\Users\Admin\roodiax.exe | N/A |
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\roodiax.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2248 wrote to memory of 1608 | N/A | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | C:\Users\Admin\roodiax.exe |
| PID 2248 wrote to memory of 1608 | N/A | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | C:\Users\Admin\roodiax.exe |
| PID 2248 wrote to memory of 1608 | N/A | C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe | C:\Users\Admin\roodiax.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe"
C:\Users\Admin\roodiax.exe
"C:\Users\Admin\roodiax.exe"
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 249.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ns1.helpupdater.net | udp |
| FI | 193.166.255.171:8000 | ns1.helpupdater.net | tcp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 17.143.109.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.197.17.2.in-addr.arpa | udp |
Files
C:\Users\Admin\roodiax.exe
| MD5 | d791256adb303441b10adbbf88227615 |
| SHA1 | c1c0ac3d57c98bc731d0a10426052b25750ae416 |
| SHA256 | 18d6dd5c5c54018a60b033314c0c15a316dce942ded5ccaa5d1315bd885ef40a |
| SHA512 | 7667936b0973c95c22993efaba3e6c0afdd02f6c89f68823e6f60a66b29d200503b7cde7c67257d2d4182c549183432786a10278758c0e79fd8e087373e2162d |