Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 19:28
Static task
static1
Behavioral task
behavioral1
Sample
1c3ace0b119de10f6ca58cb6cc5c140f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1c3ace0b119de10f6ca58cb6cc5c140f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1c3ace0b119de10f6ca58cb6cc5c140f_JaffaCakes118.exe
-
Size
96KB
-
MD5
1c3ace0b119de10f6ca58cb6cc5c140f
-
SHA1
a54266d4f447f02988b0ad287c6c27d7fdadfe71
-
SHA256
38eb8291e5f7340c97495985d73434d949350b17d815091bf40a7838b7b171bb
-
SHA512
ec65e5bf2b805e137c7d0c7f6068bfe334adfb815860fc2a77f46ad8e733bb30bb2527296d4c5ff3122351673ed4dab2866266d837213a5d665681cc19a8cede
-
SSDEEP
1536:PxZEg5239tyVQO8P8ychNwjj3RJNEo/knRzdnynE7RldNEP8lijOeDNIjni:PTE/3elychkzR3Ek65RldqDCni
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1c3ace0b119de10f6ca58cb6cc5c140f_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cuile.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation 1c3ace0b119de10f6ca58cb6cc5c140f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3484 cuile.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /F" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /A" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /O" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /U" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /c" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /K" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /f" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /y" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /B" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /w" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /Q" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /e" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /D" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /C" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /M" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /V" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /I" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /l" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /i" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /r" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /S" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /A" 1c3ace0b119de10f6ca58cb6cc5c140f_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /x" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /E" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /b" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /d" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /L" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /u" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /a" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /t" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /n" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /Y" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /T" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /J" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /z" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /Z" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /H" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /h" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /m" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /j" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /s" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /G" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /q" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /p" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /R" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /X" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /o" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /P" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /v" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /g" cuile.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuile = "C:\\Users\\Admin\\cuile.exe /W" cuile.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2320 1c3ace0b119de10f6ca58cb6cc5c140f_JaffaCakes118.exe 2320 1c3ace0b119de10f6ca58cb6cc5c140f_JaffaCakes118.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe 3484 cuile.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2320 1c3ace0b119de10f6ca58cb6cc5c140f_JaffaCakes118.exe 3484 cuile.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2320 wrote to memory of 3484 2320 1c3ace0b119de10f6ca58cb6cc5c140f_JaffaCakes118.exe 89 PID 2320 wrote to memory of 3484 2320 1c3ace0b119de10f6ca58cb6cc5c140f_JaffaCakes118.exe 89 PID 2320 wrote to memory of 3484 2320 1c3ace0b119de10f6ca58cb6cc5c140f_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c3ace0b119de10f6ca58cb6cc5c140f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1c3ace0b119de10f6ca58cb6cc5c140f_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\cuile.exe"C:\Users\Admin\cuile.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD57d80c5f9bc9e0c4ba14f5639c61ce5c1
SHA177d5c765c985c8a5777221051a59f7dedc3e1725
SHA2567cd75415dafb01c8b3f05874515b64feb3111f761f57f52fb410823d29102161
SHA512780a95852fd66b4c670202b335e5962151f5dbdfb1de195920a7d993e07e38717631f24ceb4b812f535761d5e01eff2e2c87090368cf8b0cad2bbccd092b7b17