Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe
-
Size
204KB
-
MD5
01d595e1d19f881bb45e1da9e7ea15c1
-
SHA1
2502626918e0fd57ef80068c34ff4050ead5d1cf
-
SHA256
993fd14346aaaf4549ac4e6f9cdfb4114cc58e07ed29c30c154d2a84b76e0a83
-
SHA512
04ff4a383896f822e524526c903fa2a066594fafa118a8e85f368ca5563df79f6baecdd880bd19a9a26a96dc2016e96c543e48f5c856eaa29b4c3bc030a86ce9
-
SSDEEP
6144:Js9Si/cZrSlO3OW80Nr0SkA6XLeLGvUjouMdDr7:Js9SccVSlW80N4SkA6yKUjouM1r7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tpkeam.exe -
Executes dropped EXE 1 IoCs
pid Process 2248 tpkeam.exe -
Loads dropped DLL 2 IoCs
pid Process 2168 01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe 2168 01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /f" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /d" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /t" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /B" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /I" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /U" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /S" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /b" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /H" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /T" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /r" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /c" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /n" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /G" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /h" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /v" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /o" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /Y" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /u" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /q" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /L" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /Z" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /g" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /m" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /M" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /A" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /G" 01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /p" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /K" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /R" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /a" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /P" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /N" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /s" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /x" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /k" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /z" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /w" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /J" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /X" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /y" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /E" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /l" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /O" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /e" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /D" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /V" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /j" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /i" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /F" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /Q" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /C" tpkeam.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpkeam = "C:\\Users\\Admin\\tpkeam.exe /W" tpkeam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2168 01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe 2248 tpkeam.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2168 01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe 2248 tpkeam.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2248 2168 01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe 28 PID 2168 wrote to memory of 2248 2168 01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe 28 PID 2168 wrote to memory of 2248 2168 01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe 28 PID 2168 wrote to memory of 2248 2168 01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01d595e1d19f881bb45e1da9e7ea15c1_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\tpkeam.exe"C:\Users\Admin\tpkeam.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5c1dcd183d1d48ef6ad6113aa19da1807
SHA1a344052eb386ff38d75ea98ade2ec17870b39d92
SHA256565a3b5dac364ad45cb0756ba9718e7ee6a0de040b300abb1b9432c89361dec1
SHA512461d6bf2593e9dbf337e3d7ee1e3517e46413b3430c00aeba88c5d932fd81e91c5c980e21cc2e40ea52636c21d9eb77bccee24a04a0db576cd7424e0450ee51c