Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe
-
Size
136KB
-
MD5
266292080bbba5b1f2e03d0a82426ac3
-
SHA1
29dff12cd9ae389d1328d7d47437deebd564092a
-
SHA256
eb0c944e1325de5859e5a2bd08f1c2e4b1b55b36daff121d1702dec931c2fc06
-
SHA512
855b6fffde48be31f7df7f394e3cdd84a70938abb892f1a1ce55c5e3018e2252a564e34183fa95057a42f00dbf9cd01348d322729ee4f5661077458bdea34519
-
SSDEEP
1536:NhmqXOTy6npK9x5WPjeATvbtjYYVHdzqZgIYEOCozOZD:yqX8jI93WPyAdYZgI2CozAD
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" foialos.exe -
Executes dropped EXE 1 IoCs
pid Process 2828 foialos.exe -
Loads dropped DLL 2 IoCs
pid Process 2284 266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe 2284 266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /B" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /e" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /j" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /I" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /P" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /N" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /V" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /C" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /k" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /n" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /p" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /F" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /y" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /r" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /x" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /G" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /T" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /o" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /z" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /Q" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /S" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /u" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /c" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /Y" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /O" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /a" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /f" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /L" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /l" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /Z" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /D" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /q" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /s" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /h" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /g" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /X" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /H" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /W" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /R" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /A" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /i" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /d" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /w" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /M" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /J" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /U" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /m" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /K" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /b" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /v" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /t" foialos.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\foialos = "C:\\Users\\Admin\\foialos.exe /E" foialos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe 2828 foialos.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2284 266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe 2828 foialos.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2828 2284 266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe 28 PID 2284 wrote to memory of 2828 2284 266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe 28 PID 2284 wrote to memory of 2828 2284 266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe 28 PID 2284 wrote to memory of 2828 2284 266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe 28 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27 PID 2828 wrote to memory of 2284 2828 foialos.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\foialos.exe"C:\Users\Admin\foialos.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD57eb46fdb1bd43b9956223de14535a4b1
SHA19eb0aea52c7eb366fed957c88919fb0832960aa8
SHA256b5b2b13856289cab3c966bc1e3ca4fa14f0ec2884de8af9ac33bfe748e3fdcee
SHA5120f9fce1c1792d2232677e791479005c94ed850eb36aab1b53ff16b1a5920d75adcbba3b9fc0dbf8a53baf1061e86a6f3544059a71a77ebe72e3d4250f2d5f389