Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe
-
Size
204KB
-
MD5
07b43c6ebbe48ea3536181bba5c48f38
-
SHA1
33bfdba8898e9369460e846836e53266c90654a7
-
SHA256
00ec75d8d1475a53aecd87f1d7de98e6bb48d74f058771c52f1a1ab4b8b7ee91
-
SHA512
d41211fba68d1f3bd94d4b8a811afb4dfea59e6f8993c17880bfe6fc319ca0bb0ae837baf998c2d4b446873a87d6cab1b38c3295a963423babd7876236a07680
-
SSDEEP
1536:D2ef30zZ3NMsOfXu7Ke9TG4yMSmcUk6lCbQvmSTpJwuqCNQR6nkX5SADkPY+Gdtr:yA30ZTTG4yMZc9pJSTp63ZXP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" haoayo.exe -
Executes dropped EXE 1 IoCs
pid Process 2880 haoayo.exe -
Loads dropped DLL 2 IoCs
pid Process 2240 07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe 2240 07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /O" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /N" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /q" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /Y" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /e" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /I" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /i" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /g" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /b" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /X" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /m" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /G" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /E" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /f" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /o" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /p" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /a" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /u" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /D" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /s" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /K" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /S" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /F" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /A" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /j" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /L" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /x" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /Q" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /Z" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /d" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /V" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /n" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /P" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /T" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /r" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /R" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /z" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /B" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /v" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /w" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /h" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /y" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /H" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /M" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /k" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /c" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /C" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /J" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /W" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /l" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /t" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /U" haoayo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe 2880 haoayo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2240 07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe 2880 haoayo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2880 2240 07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe 28 PID 2240 wrote to memory of 2880 2240 07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe 28 PID 2240 wrote to memory of 2880 2240 07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe 28 PID 2240 wrote to memory of 2880 2240 07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe 28 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27 PID 2880 wrote to memory of 2240 2880 haoayo.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\haoayo.exe"C:\Users\Admin\haoayo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5583f8336e6b4aedd7ed7f14f40a4632f
SHA12db82feafa58db9dd692cf75ac26fa0771a4ef70
SHA256172317ebbf975dd7dc5be6fdd9ef2efb8125a72ee21412fdc0cf357a538016f6
SHA5125892e35079874fcb330344b1df389b900ac2963529caaf60b171eb80691ccbb8f606ba6fd83874fb99d920c2323a1c83fc3cdc9c186a5c8bc35e0d8dda5ae433