Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe
-
Size
148KB
-
MD5
f1f095c8a62f0ae8f3be60bad82b0e9b
-
SHA1
49fcceb8da2940c2606fc794633c79bfbd52d52c
-
SHA256
ed81bb0f07899cdd3c9545937f50ab505a7ec8e85785be9ce1e2c03345a854cb
-
SHA512
7b2ea7fa7b73eb9d182b14dd8ac34b289097804eb206f057dc3882ccd9207e986030aaee1fb33939bd3528cba0d7aa4f3102a417ca17860955040bd2d5cdaf54
-
SSDEEP
3072:/iFiQh4mRpDGq7At/yRWr2wA36nbMUq8hFOdhIk4oQZiE6W:KFdh96F90Wf7nJPwdzWp
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xobov.exe -
Executes dropped EXE 1 IoCs
pid Process 3028 xobov.exe -
Loads dropped DLL 2 IoCs
pid Process 2472 f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe 2472 f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /U" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /v" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /q" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /P" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /x" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /Z" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /R" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /u" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /y" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /m" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /S" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /I" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /f" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /w" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /i" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /T" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /l" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /D" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /O" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /k" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /z" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /Y" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /N" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /r" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /K" f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /A" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /J" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /g" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /H" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /n" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /E" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /d" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /X" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /K" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /G" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /M" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /F" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /V" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /L" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /t" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /o" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /p" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /c" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /b" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /C" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /s" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /a" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /W" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /j" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /e" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /Q" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /B" xobov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\xobov = "C:\\Users\\Admin\\xobov.exe /h" xobov.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2472 f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe 3028 xobov.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2472 f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe 3028 xobov.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 3028 2472 f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe 28 PID 2472 wrote to memory of 3028 2472 f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe 28 PID 2472 wrote to memory of 3028 2472 f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe 28 PID 2472 wrote to memory of 3028 2472 f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\xobov.exe"C:\Users\Admin\xobov.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD58a936a8ed927288a14cf1b0ece922376
SHA1729f3036a1ace7b335c959a4be618886f7be8754
SHA2562312bfea77ff2858987ac56033a5c5ac9982eb65c16d30da2ad9346207821187
SHA512ebe9907a2ac0743bac1e0e07b598f564750de2470d7ee357e6f7508c35b6d03e14c44dce3ebdb9d02ef660a2bee407d66f6a60f84189f3c73f9f89844772c87a