Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
f111c48b0b85d9af96f51956c5a205ab_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f111c48b0b85d9af96f51956c5a205ab_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f111c48b0b85d9af96f51956c5a205ab_JaffaCakes118.exe
-
Size
135KB
-
MD5
f111c48b0b85d9af96f51956c5a205ab
-
SHA1
145e821cef0d17c1184c9ae17d98c6bffa548c68
-
SHA256
4758a6400e77c538d7dc025f913bcb3b3e8fcc0f3e58fcb16e7d824b4bec69b7
-
SHA512
b84f37bf222005a7427089396dddef5fa6726f400928d54ff6c2385661c4e110b06f7850833d729bec388a2fee6efe4996f893c913aef5aca48a3af14a8f7cb2
-
SSDEEP
3072:wPzIwNmCc3VsweCeXRzeSeVeEe0eDQ8jrTrf:KzlNmCc3VsZR3Q8jrTr
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" reouto.exe -
Executes dropped EXE 1 IoCs
pid Process 2940 reouto.exe -
Loads dropped DLL 2 IoCs
pid Process 1784 f111c48b0b85d9af96f51956c5a205ab_JaffaCakes118.exe 1784 f111c48b0b85d9af96f51956c5a205ab_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\reouto = "C:\\Users\\Admin\\reouto.exe" reouto.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe 2940 reouto.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1784 f111c48b0b85d9af96f51956c5a205ab_JaffaCakes118.exe 2940 reouto.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2940 1784 f111c48b0b85d9af96f51956c5a205ab_JaffaCakes118.exe 28 PID 1784 wrote to memory of 2940 1784 f111c48b0b85d9af96f51956c5a205ab_JaffaCakes118.exe 28 PID 1784 wrote to memory of 2940 1784 f111c48b0b85d9af96f51956c5a205ab_JaffaCakes118.exe 28 PID 1784 wrote to memory of 2940 1784 f111c48b0b85d9af96f51956c5a205ab_JaffaCakes118.exe 28 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27 PID 2940 wrote to memory of 1784 2940 reouto.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f111c48b0b85d9af96f51956c5a205ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f111c48b0b85d9af96f51956c5a205ab_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\reouto.exe"C:\Users\Admin\reouto.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD52344f4af708ff9648fdbf744f19a5455
SHA17402829fb73c85a89a117b18568beeeed18d705f
SHA256456516ed7542dd40b3ffa43d7fefb8508d792380e54fb2c3b4b096202ebd6edc
SHA512f3145d82a81e70610c95ebfdfac0625de8056a63dd3b935d6154025bd7517c296af8bd35b0757ac81f56c48781ddf57d01eb73e45d10c92fa6904ecbd97a4e4c