Analysis
-
max time kernel
149s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
04f06ab4a97367739cadcaf57b8c200a_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
04f06ab4a97367739cadcaf57b8c200a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
04f06ab4a97367739cadcaf57b8c200a_JaffaCakes118.exe
-
Size
96KB
-
MD5
04f06ab4a97367739cadcaf57b8c200a
-
SHA1
99d3701fa550e0cb4ba4b70ba2de9100d5cfdf56
-
SHA256
bc59ee069ccde6ca5963358d978af44f641b115ac2f104e5ba0aef4a8a79eaaf
-
SHA512
306866df6911d1075eee07f040932c23313fbc6a4213884acd3a9051a22335584c94261e43197152730535b3654424fe7eb7f9b028cb70d42626d2d3aff0770b
-
SSDEEP
1536:IHQBHIf6cO/hjwlkGulSc16l6u+NMMl/KlYv1Tq5ThFfNIjnZ5V:7zhjwClu8CFFfCn7V
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 04f06ab4a97367739cadcaf57b8c200a_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" beeob.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 04f06ab4a97367739cadcaf57b8c200a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 436 beeob.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /V" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /o" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /M" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /l" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /g" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /L" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /k" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /f" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /w" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /P" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /q" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /j" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /O" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /Z" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /d" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /s" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /m" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /x" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /A" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /E" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /h" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /e" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /z" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /S" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /y" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /W" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /Q" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /K" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /U" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /X" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /p" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /C" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /n" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /I" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /D" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /s" 04f06ab4a97367739cadcaf57b8c200a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /G" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /N" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /r" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /v" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /i" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /Y" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /b" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /R" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /F" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /T" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /t" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /J" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /B" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /u" beeob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beeob = "C:\\Users\\Admin\\beeob.exe /c" beeob.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 228 04f06ab4a97367739cadcaf57b8c200a_JaffaCakes118.exe 228 04f06ab4a97367739cadcaf57b8c200a_JaffaCakes118.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe 436 beeob.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 228 04f06ab4a97367739cadcaf57b8c200a_JaffaCakes118.exe 436 beeob.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 228 wrote to memory of 436 228 04f06ab4a97367739cadcaf57b8c200a_JaffaCakes118.exe 86 PID 228 wrote to memory of 436 228 04f06ab4a97367739cadcaf57b8c200a_JaffaCakes118.exe 86 PID 228 wrote to memory of 436 228 04f06ab4a97367739cadcaf57b8c200a_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\04f06ab4a97367739cadcaf57b8c200a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04f06ab4a97367739cadcaf57b8c200a_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\beeob.exe"C:\Users\Admin\beeob.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD50fc7feea2e60e27db6f64742cfe47857
SHA1aef43ec883e65636fb138f35b4317cc0e3ee712f
SHA256d235c4b9dc43651041a58a5f6f53e40c2a6fb14275b5792d26d696404f4e8199
SHA512877a7396e2c76c219f250333465159d1d1e8561c378bc883edbd01a559ee39903510e4c344b1d4dbc4470d5419b9a7d44cd3a3497f613a7568221f35e553ef97