Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 09:24
Static task
static1
Behavioral task
behavioral1
Sample
21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe
-
Size
152KB
-
MD5
21d9eb60714e4800705343eb59fab2cc
-
SHA1
0439caff552910d599cda26eb99dd008ccde3727
-
SHA256
dbf040b824f0b90084f5147c3ce60059964b8064775535545b88efb91af0c58d
-
SHA512
f10ba75e80be5b0dcd63766768876dba11b39954010de440c7dda46663ca08f3eb83887b9cf00bfc461e9b48e8fc6d4b7ba13f6bd213426ec0a2a390d1e550df
-
SSDEEP
3072:HMGOPYYh0Zq+7DxNUbaxIcz93bOButK+kAq:q+7DxVh3bHU7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kuxig.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 5020 kuxig.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /n" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /a" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /C" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /l" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /F" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /i" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /o" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /z" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /P" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /I" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /g" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /X" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /k" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /R" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /H" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /c" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /s" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /w" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /E" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /v" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /x" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /U" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /G" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /Y" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /L" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /S" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /T" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /p" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /O" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /r" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /A" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /t" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /m" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /V" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /q" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /B" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /b" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /K" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /N" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /W" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /D" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /M" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /d" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /u" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /Z" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /y" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /q" 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /j" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /h" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /J" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /e" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /Q" kuxig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuxig = "C:\\Users\\Admin\\kuxig.exe /f" kuxig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4208 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe 4208 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe 5020 kuxig.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4208 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe 5020 kuxig.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4208 wrote to memory of 5020 4208 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe 81 PID 4208 wrote to memory of 5020 4208 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe 81 PID 4208 wrote to memory of 5020 4208 21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21d9eb60714e4800705343eb59fab2cc_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\kuxig.exe"C:\Users\Admin\kuxig.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD56f3b39f9fe555797cceb3f71a5d1e928
SHA194743c64e3a60cc9d4a51a1ce06916ed23cfff74
SHA2569a746a38c822561b157eb60bf285c8ba6716e22b3fe7b2461a83bc9364d54142
SHA5125798ff695b558f5eda7a3ada6f197099ee044dd55bc335faafc951ff0210ed63a07bf8e12233f7f0058a9eb7fac64da60cd6d23475adad886a6b2bf8f9c7cb85