Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe
-
Size
240KB
-
MD5
1a627eba4f90a6454bf4c2cddf686bff
-
SHA1
87a8c036552e0888a782de9974385086c05da0bf
-
SHA256
d1546b563eea1f35a9ae17d035eaa7ce38936063cde36de05cc4963d24e578d3
-
SHA512
2c6610af1a09a573ce2e23ddaf09a0799bb0301907952ce56a40426ab97a66fe6e0bf2df62a2f664023d60393c28ecae9ab7be79c9781076d242c286a103115b
-
SSDEEP
6144:AUR3dwqsNwemAB0EqxF6snji81RUinKchhyCSf:RdQQJsNf
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rrkais.exe -
Executes dropped EXE 1 IoCs
pid Process 940 rrkais.exe -
Loads dropped DLL 2 IoCs
pid Process 1420 1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe 1420 1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /x" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /p" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /q" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /u" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /h" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /m" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /i" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /w" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /j" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /r" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /l" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /o" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /c" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /e" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /g" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /v" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /a" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /n" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /z" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /y" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /s" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /f" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /b" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /k" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /t" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /d" rrkais.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrkais = "C:\\Users\\Admin\\rrkais.exe /z" 1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1420 1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe 940 rrkais.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1420 1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe 940 rrkais.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1420 wrote to memory of 940 1420 1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe 28 PID 1420 wrote to memory of 940 1420 1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe 28 PID 1420 wrote to memory of 940 1420 1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe 28 PID 1420 wrote to memory of 940 1420 1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1a627eba4f90a6454bf4c2cddf686bff_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\rrkais.exe"C:\Users\Admin\rrkais.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5f006752bd540d261baf0a18d2ec3123a
SHA18da2936c280891b1b92e54afafbed03ca081864f
SHA2567035d8da0941a59858be7be27933ebc9a7fb5fae772715a68f86cba0efb1686d
SHA512717743bd073c297e7205d090f5f10c9ed95f7d4e22baece3b6d9cf7e8e24edabd4a25677071aa9eb2849662b905c03a104cf68d2245a82014a2ef2608b254d7b