Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
19f0f711d8f80b15af81abed27e1a7bc_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
19f0f711d8f80b15af81abed27e1a7bc_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
19f0f711d8f80b15af81abed27e1a7bc_JaffaCakes118.exe
-
Size
88KB
-
MD5
19f0f711d8f80b15af81abed27e1a7bc
-
SHA1
9255aeaddeabc795e97e0313e234ca3423412963
-
SHA256
9b183823634f437c305cb7ee694a9c72c2089a838164e56b8aa8cd07ace9ca02
-
SHA512
eb1f5c766bde11f5d6de2448503ac2d294072e89ba497de8e3a7dafbffacdf847dfa165fb900b1b8d7bcfdb4d522a6c60a31c51df0c80517a38d85ab2017749d
-
SSDEEP
1536:0qW7SSpy8tXG06YpqdXTsYJ/F+FBFIFGFYF7DUZxTZ+ma:aeSs0G0mZPv
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" veifuh.exe -
Executes dropped EXE 1 IoCs
pid Process 2332 veifuh.exe -
Loads dropped DLL 2 IoCs
pid Process 1732 19f0f711d8f80b15af81abed27e1a7bc_JaffaCakes118.exe 1732 19f0f711d8f80b15af81abed27e1a7bc_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /p" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /i" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /V" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /G" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /o" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /d" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /w" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /T" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /H" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /b" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /m" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /W" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /s" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /h" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /k" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /r" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /M" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /a" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /f" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /Z" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /K" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /U" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /E" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /B" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /x" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /R" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /j" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /P" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /L" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /e" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /u" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /F" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /t" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /N" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /J" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /z" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /g" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /O" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /D" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /l" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /X" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /q" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /Y" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /Q" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /y" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /C" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /A" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /v" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /c" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /n" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /I" veifuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veifuh = "C:\\Users\\Admin\\veifuh.exe /S" veifuh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe 2332 veifuh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1732 19f0f711d8f80b15af81abed27e1a7bc_JaffaCakes118.exe 2332 veifuh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2332 1732 19f0f711d8f80b15af81abed27e1a7bc_JaffaCakes118.exe 28 PID 1732 wrote to memory of 2332 1732 19f0f711d8f80b15af81abed27e1a7bc_JaffaCakes118.exe 28 PID 1732 wrote to memory of 2332 1732 19f0f711d8f80b15af81abed27e1a7bc_JaffaCakes118.exe 28 PID 1732 wrote to memory of 2332 1732 19f0f711d8f80b15af81abed27e1a7bc_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\19f0f711d8f80b15af81abed27e1a7bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19f0f711d8f80b15af81abed27e1a7bc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\veifuh.exe"C:\Users\Admin\veifuh.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5bfc09de19f589e9fccff946f54d90501
SHA1ec32ff5d4aed6bf615ef289cf989ecd4382ee257
SHA256c4ce9b27309484533a6693810c6b649011276eecc78d72370fece326f3008d14
SHA512f1bf4160f02c8aac581621857a6d00556cc6c77ab7140806970ff5f923854aa88cce0d80a0ada8a249a5bd123af6917050af0909053c1dc0a9ec876df2d9062a