Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
026c6a13c4a35e87f2dd384c81ec88db_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
026c6a13c4a35e87f2dd384c81ec88db_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
026c6a13c4a35e87f2dd384c81ec88db_JaffaCakes118.exe
-
Size
224KB
-
MD5
026c6a13c4a35e87f2dd384c81ec88db
-
SHA1
882e9cb9a0f87203a3bd5323f310ded6c9f96fc9
-
SHA256
9d5517b5485a0bbe3649ff0b7f3d45d289208471704759514aaefd24615de59f
-
SHA512
a76c9fde522ff3e79bfa9cf915bf0adc13ea6133516173d725043bc345ae0e9edcc802d27b457f7257118be77fcbae1a7d2b86da78a6c21d58f29c25b0ff0db0
-
SSDEEP
6144:9pY1DifkpJFhSpe/+Ij7NweeJEKlJ85eg/0ISDhfq:9pYRisJXKIj3e6Rvd/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qukim.exe -
Executes dropped EXE 1 IoCs
pid Process 3024 qukim.exe -
Loads dropped DLL 2 IoCs
pid Process 1848 026c6a13c4a35e87f2dd384c81ec88db_JaffaCakes118.exe 1848 026c6a13c4a35e87f2dd384c81ec88db_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 48 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /D" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /k" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /c" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /Z" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /j" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /x" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /g" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /w" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /H" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /L" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /E" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /u" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /Q" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /G" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /K" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /a" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /v" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /t" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /R" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /C" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /d" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /h" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /e" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /F" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /b" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /p" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /X" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /r" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /Y" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /y" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /o" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /O" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /l" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /B" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /V" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /m" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /i" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /A" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /N" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /U" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /q" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /z" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /f" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /n" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /W" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /S" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /T" qukim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qukim = "C:\\Users\\Admin\\qukim.exe /P" qukim.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe 3024 qukim.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1848 026c6a13c4a35e87f2dd384c81ec88db_JaffaCakes118.exe 3024 qukim.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 3024 1848 026c6a13c4a35e87f2dd384c81ec88db_JaffaCakes118.exe 28 PID 1848 wrote to memory of 3024 1848 026c6a13c4a35e87f2dd384c81ec88db_JaffaCakes118.exe 28 PID 1848 wrote to memory of 3024 1848 026c6a13c4a35e87f2dd384c81ec88db_JaffaCakes118.exe 28 PID 1848 wrote to memory of 3024 1848 026c6a13c4a35e87f2dd384c81ec88db_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\026c6a13c4a35e87f2dd384c81ec88db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\026c6a13c4a35e87f2dd384c81ec88db_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\qukim.exe"C:\Users\Admin\qukim.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD511973747669200471616b9e5e5e39601
SHA1465a0d52de432d2a700e89a79041adc16aea52e5
SHA25658cdb3c2c318748d7c224e4c659a867adcf928d9a5e6e25baa8a8ef2f8e91f21
SHA512c7b76741cae6e73d103062e2234de1bcc69c6ef54e8524512ca6c44cb81913aac5f2040857b705591906fe3dcaa750f15556bd929946fd11aee65ee641445804