Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 15:37
Static task
static1
Behavioral task
behavioral1
Sample
28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe
-
Size
124KB
-
MD5
28ae87f7f59309f865834ae7444a527a
-
SHA1
a58d6a57f736506e14b5381cf5e957a4eaff9828
-
SHA256
62852996b29b33dd7f2be67fc55f87196104c293f7ef14d19295eb6e20b14ee8
-
SHA512
c1cd9d36e39668f5dee7f05591dd617f9f9b8fc1d65664ffbf136971fad18e59deef06f2c5e7213301dd6c5dd52dce9aca4fc9eb4f37f21fb50fbe42c420b15b
-
SSDEEP
3072:ICosBK3vXvOG2RdYjH08qdLxilMiyfwAfGxMw9:5osBK3vXWG4mzQLxilMiyfwAfGx
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kuaiqi.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 kuaiqi.exe -
Loads dropped DLL 2 IoCs
pid Process 2380 28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe 2380 28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /E" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /H" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /X" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /U" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /p" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /y" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /V" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /B" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /i" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /T" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /j" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /F" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /G" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /O" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /N" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /m" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /K" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /q" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /z" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /o" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /M" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /D" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /L" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /f" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /Q" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /R" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /h" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /v" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /r" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /g" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /S" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /c" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /d" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /C" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /s" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /J" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /Z" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /x" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /I" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /k" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /e" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /A" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /Y" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /P" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /l" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /X" 28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /W" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /a" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /b" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /t" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /n" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /u" kuaiqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuaiqi = "C:\\Users\\Admin\\kuaiqi.exe /w" kuaiqi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2380 28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe 2564 kuaiqi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2380 28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe 2564 kuaiqi.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2564 2380 28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2564 2380 28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2564 2380 28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2564 2380 28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\28ae87f7f59309f865834ae7444a527a_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\kuaiqi.exe"C:\Users\Admin\kuaiqi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5fdb921e6402a1c32229cc31473aeade7
SHA127acb3ea54709ec18519d45efdb53fe65563d855
SHA256396f2ed3df21f64090cde88683deb97f18cb2c1c2464b3d6d03bbe51cde113d9
SHA512f2f6eea05b57812dea3da7e937eed15a4f2a1d5ee946dcf95dcaa4c2a8d6bf247a1c22cd1dd1a1ac2494726a4ecc90b74674e958cb4980e7e00c97ed91ed5043