Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
251f1b20b902458158c71cb1752fc77c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
251f1b20b902458158c71cb1752fc77c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
251f1b20b902458158c71cb1752fc77c_JaffaCakes118.exe
-
Size
216KB
-
MD5
251f1b20b902458158c71cb1752fc77c
-
SHA1
4acc609b012dc75e441c8f53802c8313b4075cf1
-
SHA256
6dfb2d77b292ea64678f0eac421b45281e6f1352f368df2cf7a313f09ce8d7f1
-
SHA512
2590f99129b5cf299d1619b031f0298aca0ebe17c09416aceea7eef6c245261b7ebc10b662c43250ebae4284650a27835e5b852426f128219f4602bfef2a62c3
-
SSDEEP
6144:u5AcwGXms9Y9/iABfSTjGYUBxEHBTPy5VvNxOi89MWJ7NG4/nRNDJO00/gc7:u+cwGnUlBxEHBTSxOi81nRNDJO00l7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jaaluo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 251f1b20b902458158c71cb1752fc77c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4176 jaaluo.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /k" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /t" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /n" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /b" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /G" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /K" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /X" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /j" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /Z" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /w" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /B" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /f" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /F" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /l" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /e" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /x" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /v" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /u" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /D" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /L" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /s" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /W" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /A" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /O" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /U" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /c" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /S" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /g" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /N" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /q" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /H" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /P" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /o" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /M" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /Q" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /a" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /r" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /h" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /J" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /E" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /V" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /R" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /y" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /Y" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /i" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /d" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /z" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /T" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /C" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /m" jaaluo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaluo = "C:\\Users\\Admin\\jaaluo.exe /p" jaaluo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe 4176 jaaluo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2944 251f1b20b902458158c71cb1752fc77c_JaffaCakes118.exe 4176 jaaluo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2944 wrote to memory of 4176 2944 251f1b20b902458158c71cb1752fc77c_JaffaCakes118.exe 81 PID 2944 wrote to memory of 4176 2944 251f1b20b902458158c71cb1752fc77c_JaffaCakes118.exe 81 PID 2944 wrote to memory of 4176 2944 251f1b20b902458158c71cb1752fc77c_JaffaCakes118.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\251f1b20b902458158c71cb1752fc77c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\251f1b20b902458158c71cb1752fc77c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\jaaluo.exe"C:\Users\Admin\jaaluo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5d8fb433fb8da399eff02fc71f80c89f5
SHA1b62b7b412bf9636c5d0e49595a79ba5ca36f2f27
SHA2561b13460f16bc3666d3e722c40df79d6bf6c9637aa7ad5ea1db91c3865cb6ec8b
SHA5129a3e48403e8fa669a36e3d0df1969a25894b2a33d5520cf8b4d0a89a314efcb530e1dd778372e89ec132d2624c0c01f68974f311ba615e9a7c037bab3ee1d60b