Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 12:15
Static task
static1
Behavioral task
behavioral1
Sample
15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe
-
Size
156KB
-
MD5
15f80c4656603913ba10ab2defe54983
-
SHA1
33b241cdad52c398e1acb998b4cb2d82a69c70bf
-
SHA256
841304d62ba17749010517583c8df03fc87dfcd83e3171064f5029393f1498df
-
SHA512
47eb2bea09a1e8e42032910fdc4beaf1ec7efdb2a89f3d317fad71c8aa176e29460165154c786d461366868bfae74b9929e48450f894429e67a1242fde5ee3ea
-
SSDEEP
3072:oBd12E2MtU7Qv0w4ZRRQMMDwtIMCeFP4ANV4oQZiEtdLUF:6dsE2R7Qvb4tQTaCeFP4ABWzo
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jvlag.exe -
Executes dropped EXE 1 IoCs
pid Process 2868 jvlag.exe -
Loads dropped DLL 2 IoCs
pid Process 1908 15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe 1908 15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /Q" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /t" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /i" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /X" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /q" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /o" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /Z" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /F" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /G" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /r" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /O" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /l" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /H" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /P" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /h" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /y" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /I" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /Y" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /s" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /x" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /c" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /e" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /U" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /C" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /W" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /L" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /z" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /j" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /S" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /R" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /p" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /n" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /T" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /d" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /J" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /m" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /f" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /A" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /E" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /N" 15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /K" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /b" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /v" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /N" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /w" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /B" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /k" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /g" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /V" jvlag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jvlag = "C:\\Users\\Admin\\jvlag.exe /D" jvlag.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1908 15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe 2868 jvlag.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1908 15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe 2868 jvlag.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2868 1908 15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2868 1908 15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2868 1908 15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2868 1908 15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15f80c4656603913ba10ab2defe54983_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\jvlag.exe"C:\Users\Admin\jvlag.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5c7f02205a129370ebdae3e0ec67a7e17
SHA19a8d8297a9b735837c9ba8469cccef59b0bf64d6
SHA25625ae7d741c5f981456f1df95f39acced29746c3af3122a4c334841c86432095d
SHA512fb10611b48c0f7f4ecfa6e2cb1147feb3ca9956cfe3f82facbadb54f1c3b66eedb7acc9b753c15a56edac3f81f72724c7273c5b090c021f6307cadf70257f904