Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
0c62ad4f82d3097799d8df49794a81b5_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0c62ad4f82d3097799d8df49794a81b5_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0c62ad4f82d3097799d8df49794a81b5_JaffaCakes118.exe
-
Size
284KB
-
MD5
0c62ad4f82d3097799d8df49794a81b5
-
SHA1
f04aec403f1aa4c9daba4cc4e778f1910012641d
-
SHA256
219da0be612116d611eb31cb3c4717e89d616249bd234df6df4f7052f1a824e4
-
SHA512
5f6c3f5cf869f3088b2cb45add3dcdfb1abc488b89a155c262401b30912fa51321bda790a3169a96942ebc2fb315811dcd391baa420a86db6feae6bbfe3aa1e0
-
SSDEEP
1536:jCy9bdK0nsznsXodoz9odo2oIoGo+odoaoaoMoTehegeQeae9o0oVoNo3oEoroAo:F9FnsznsHN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fuoag.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 fuoag.exe -
Loads dropped DLL 2 IoCs
pid Process 1704 0c62ad4f82d3097799d8df49794a81b5_JaffaCakes118.exe 1704 0c62ad4f82d3097799d8df49794a81b5_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /a" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /k" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /E" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /K" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /h" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /s" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /c" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /U" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /Z" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /L" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /t" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /C" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /p" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /R" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /T" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /H" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /G" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /B" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /S" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /r" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /X" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /g" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /Y" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /J" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /N" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /l" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /Q" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /d" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /I" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /v" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /e" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /x" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /O" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /j" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /o" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /P" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /m" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /F" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /M" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /V" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /b" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /D" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /i" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /n" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /u" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /y" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /q" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /z" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /W" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /A" fuoag.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuoag = "C:\\Users\\Admin\\fuoag.exe /f" fuoag.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe 3052 fuoag.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1704 0c62ad4f82d3097799d8df49794a81b5_JaffaCakes118.exe 3052 fuoag.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 3052 1704 0c62ad4f82d3097799d8df49794a81b5_JaffaCakes118.exe 28 PID 1704 wrote to memory of 3052 1704 0c62ad4f82d3097799d8df49794a81b5_JaffaCakes118.exe 28 PID 1704 wrote to memory of 3052 1704 0c62ad4f82d3097799d8df49794a81b5_JaffaCakes118.exe 28 PID 1704 wrote to memory of 3052 1704 0c62ad4f82d3097799d8df49794a81b5_JaffaCakes118.exe 28 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27 PID 3052 wrote to memory of 1704 3052 fuoag.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c62ad4f82d3097799d8df49794a81b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c62ad4f82d3097799d8df49794a81b5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\fuoag.exe"C:\Users\Admin\fuoag.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD57140bccfadf938a6b6e2ca4d78fa78e3
SHA120885fc9b38187dd684ba050d4a29e057a182f56
SHA256ff1dd95fec0a0f5d78364f7750fabd9fbdccb3d90d75d7bf645f8bb4cdc88a32
SHA51249dd51c81efcc1c3137dc437bebf730163d782c6a6992a5f450f79add5eb662e3e1ac2622d7e60bac9bb878634ab7cf51b757205eee07692e0ac797933322d83