Analysis
-
max time kernel
149s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe
-
Size
184KB
-
MD5
f5d5c793fa07ff2f0db10277b3caf020
-
SHA1
813b5427add51a73395d75ab4c2dfc217e8753e1
-
SHA256
7db6d83a30937c8ea11c35fbab1e2065c201137e978774f44ba43f2be38feff1
-
SHA512
63698d0300f139045de2228fa340c55e3bc033daebd223c509a3a655af1748205ca882ce2313fa73f14fa3cf09122758262fcbc636ae65d5074b50a364faadac
-
SSDEEP
3072:SWVg+CWoYTzCh46Knvmb7/D26ytQlw/Lg5q69srijEIS3A:IGpz6LKnvmb7/D26yQlw/Lg5qosri/Sw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jqbuev.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4596 jqbuev.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /Y" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /T" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /r" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /l" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /I" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /D" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /v" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /W" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /g" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /o" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /b" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /R" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /w" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /z" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /P" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /J" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /x" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /E" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /a" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /V" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /e" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /d" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /f" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /t" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /M" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /H" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /i" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /p" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /n" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /B" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /O" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /L" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /s" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /N" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /Z" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /m" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /C" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /h" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /k" f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /k" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /c" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /K" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /y" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /U" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /A" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /u" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /Q" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /G" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /S" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /q" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /j" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /F" jqbuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqbuev = "C:\\Users\\Admin\\jqbuev.exe /X" jqbuev.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2456 f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe 2456 f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe 4596 jqbuev.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2456 f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe 4596 jqbuev.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2456 wrote to memory of 4596 2456 f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe 93 PID 2456 wrote to memory of 4596 2456 f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe 93 PID 2456 wrote to memory of 4596 2456 f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\jqbuev.exe"C:\Users\Admin\jqbuev.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD572352d435efae43610025e2d66a3479e
SHA10c2d496b6c49b7e3d0b97dcbf41dfbf01eb6f1f1
SHA256892949736c50134f8f18bfdd066c3f150164dc1f33c96e34a4c22d6ed90a9253
SHA5122b48ea09ee855ff96dca44c088dfc75d98515fdc627e35d92c2ab56ebcdb7aa88a84ab847f6d90fd49882e2ccf449ef36782d1adb89c53d825e2c9e7c9223a56