Malware Analysis Report

2025-03-14 22:36

Sample ID 240406-sj1gyadf44
Target e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118
SHA256 18c6613792002a37e9ec93b449cb77b5d50c8d12e5fe3075b90d9a1660db2a66
Tags
evasion persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

18c6613792002a37e9ec93b449cb77b5d50c8d12e5fe3075b90d9a1660db2a66

Threat Level: Known bad

The file e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

evasion persistence

Modifies visiblity of hidden/system files in Explorer

Executes dropped EXE

Loads dropped DLL

Checks computer location settings

Adds Run key to start application

Enumerates physical storage devices

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Modifies registry class

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-06 15:10

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-06 15:10

Reported

2024-04-06 15:12

Platform

win7-20231129-en

Max time kernel

150s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe"

Signatures

Modifies visiblity of hidden/system files in Explorer

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" C:\Users\Admin\mauwe.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\mauwe.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /l" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /j" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /r" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /y" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /i" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /d" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /s" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /g" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /u" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /o" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /b" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /f" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /e" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /q" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /h" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /v" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /n" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /w" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /t" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /o" C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /m" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /a" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /p" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /z" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /k" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /x" C:\Users\Admin\mauwe.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\mauwe = "C:\\Users\\Admin\\mauwe.exe /c" C:\Users\Admin\mauwe.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\mauwe.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe"

C:\Users\Admin\mauwe.exe

"C:\Users\Admin\mauwe.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 ns1.helpupdater.net udp
FI 193.166.255.171:8000 ns1.helpupdater.net tcp

Files

C:\Users\Admin\mauwe.exe

MD5 f914e0a06f5276067278c784cf0b018c
SHA1 e31ec326bb12fd10f291981f80945157563899b0
SHA256 69753bb91304c1fccdc454e88a54143a37b609eadcd284dd0313716e63ab5bb2
SHA512 84f85c60fe637f16b72b6c32ca8470170b187228cb84190aba2c55486ec37ea8205c5e3dde28062660096c3b0b5e527d1fd5b44bcf8b943afc146a84eb5aa83e

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-06 15:10

Reported

2024-04-06 15:12

Platform

win10v2004-20240226-en

Max time kernel

149s

Max time network

129s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe"

Signatures

Modifies visiblity of hidden/system files in Explorer

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" C:\Users\Admin\roodiax.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\roodiax.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /y" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /w" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /k" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /u" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /b" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /r" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /m" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /s" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /o" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /z" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /n" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /j" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /p" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /f" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /q" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /h" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /d" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /g" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /x" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /e" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /l" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /c" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /t" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /v" C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /a" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /i" C:\Users\Admin\roodiax.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roodiax = "C:\\Users\\Admin\\roodiax.exe /v" C:\Users\Admin\roodiax.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\roodiax.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e2d061cb1b9a5e0ce3b2b4643b74d8df_JaffaCakes118.exe"

C:\Users\Admin\roodiax.exe

"C:\Users\Admin\roodiax.exe"

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 ns1.helpupdater.net udp
FI 193.166.255.171:8000 ns1.helpupdater.net tcp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 17.143.109.104.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp

Files

C:\Users\Admin\roodiax.exe

MD5 d791256adb303441b10adbbf88227615
SHA1 c1c0ac3d57c98bc731d0a10426052b25750ae416
SHA256 18d6dd5c5c54018a60b033314c0c15a316dce942ded5ccaa5d1315bd885ef40a
SHA512 7667936b0973c95c22993efaba3e6c0afdd02f6c89f68823e6f60a66b29d200503b7cde7c67257d2d4182c549183432786a10278758c0e79fd8e087373e2162d