Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
fe03c6cab7c4b5e09bcfdf7d4d7e87e0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe03c6cab7c4b5e09bcfdf7d4d7e87e0_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fe03c6cab7c4b5e09bcfdf7d4d7e87e0_JaffaCakes118.exe
-
Size
272KB
-
MD5
fe03c6cab7c4b5e09bcfdf7d4d7e87e0
-
SHA1
067f68d7da560a99e22a6e6d6a3c65d6a594119d
-
SHA256
100e85bf99938bbccf4a3b6fe44921fc41317e727fa3056a3e0b7c525e97bd6d
-
SHA512
f3ff9e0e3254cae0e0ed2a4ba5a9c562906ec578af31a37a591e261db82d890121acd3bdd8a12ea524473876eb40b3a01d7607d9e3f998cd7bbac40c2f038642
-
SSDEEP
6144:z3aAKlQxchRdjLmtrBuMrdekUH63u+X5sc57/k:m4xGLTuPL5g
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fe03c6cab7c4b5e09bcfdf7d4d7e87e0_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" juiuqom.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation fe03c6cab7c4b5e09bcfdf7d4d7e87e0_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3500 juiuqom.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /V" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /S" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /P" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /y" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /w" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /K" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /b" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /A" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /v" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /z" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /N" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /E" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /B" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /u" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /F" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /Q" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /I" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /x" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /G" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /g" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /J" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /p" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /o" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /i" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /a" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /j" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /f" fe03c6cab7c4b5e09bcfdf7d4d7e87e0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /X" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /C" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /Y" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /W" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /Z" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /R" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /r" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /k" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /e" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /m" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /s" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /M" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /f" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /U" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /L" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /h" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /D" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /t" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /T" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /n" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /q" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /H" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /d" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /c" juiuqom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juiuqom = "C:\\Users\\Admin\\juiuqom.exe /l" juiuqom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4708 fe03c6cab7c4b5e09bcfdf7d4d7e87e0_JaffaCakes118.exe 4708 fe03c6cab7c4b5e09bcfdf7d4d7e87e0_JaffaCakes118.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe 3500 juiuqom.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4708 fe03c6cab7c4b5e09bcfdf7d4d7e87e0_JaffaCakes118.exe 3500 juiuqom.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4708 wrote to memory of 3500 4708 fe03c6cab7c4b5e09bcfdf7d4d7e87e0_JaffaCakes118.exe 90 PID 4708 wrote to memory of 3500 4708 fe03c6cab7c4b5e09bcfdf7d4d7e87e0_JaffaCakes118.exe 90 PID 4708 wrote to memory of 3500 4708 fe03c6cab7c4b5e09bcfdf7d4d7e87e0_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe03c6cab7c4b5e09bcfdf7d4d7e87e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe03c6cab7c4b5e09bcfdf7d4d7e87e0_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\juiuqom.exe"C:\Users\Admin\juiuqom.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD593c64a839ff2914729348261d2ea51ea
SHA13ced82ae7d30538c57b325089a926fccfc0ab05b
SHA25685d561eb87347bc13d9f0ce1f45416f807a65b4cf46176d2a52ec8b6c178fbb9
SHA5120d688b4571de0a571c5db9d3ec21ff7cbca873303a3c5f8aaa055899d0406e158ca0c5ef07892062c8b371415901c59f9f335299db3f5baab95b5480151aeabf