Analysis
-
max time kernel
149s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
295511acd6dff88f23e4db56059e088e_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
295511acd6dff88f23e4db56059e088e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
295511acd6dff88f23e4db56059e088e_JaffaCakes118.exe
-
Size
92KB
-
MD5
295511acd6dff88f23e4db56059e088e
-
SHA1
4aecdb64d0d9afc9efd58e76db16d3c168181357
-
SHA256
091ddc22680eaf4690c3b8499acfc2bc166aab1632b191f0613994d7f8167e4c
-
SHA512
0d3e7f8ecd32190e967c313f9468f0a8827822755553e8bcc41578e6138028ee6d273654443125ef183c91e9bf6e5ff7f518121c53ed2ab9ada9f9f7e7fa84c1
-
SSDEEP
1536:pRLXqgBYd6iTGuR6n2nlba/yToFmLrac1cWcZc+c5cNsZqbgDPkA:3TqKYdFd8gHqMDPv
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" voobiar.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\Control Panel\International\Geo\Nation 295511acd6dff88f23e4db56059e088e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2272 voobiar.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /y" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /A" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /a" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /D" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /W" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /Z" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /B" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /v" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /I" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /Q" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /H" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /V" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /F" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /s" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /L" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /i" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /r" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /R" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /t" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /b" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /m" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /M" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /T" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /o" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /E" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /N" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /C" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /J" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /O" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /K" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /h" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /j" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /x" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /n" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /g" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /k" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /f" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /p" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /q" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /G" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /e" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /S" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /d" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /X" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /z" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /c" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /P" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /Y" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /l" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /U" voobiar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voobiar = "C:\\Users\\Admin\\voobiar.exe /w" voobiar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe 2272 voobiar.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3980 295511acd6dff88f23e4db56059e088e_JaffaCakes118.exe 2272 voobiar.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3980 wrote to memory of 2272 3980 295511acd6dff88f23e4db56059e088e_JaffaCakes118.exe 85 PID 3980 wrote to memory of 2272 3980 295511acd6dff88f23e4db56059e088e_JaffaCakes118.exe 85 PID 3980 wrote to memory of 2272 3980 295511acd6dff88f23e4db56059e088e_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\295511acd6dff88f23e4db56059e088e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\295511acd6dff88f23e4db56059e088e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\voobiar.exe"C:\Users\Admin\voobiar.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD56a179f7dad823b7eaf372d9f74fda087
SHA1aa40f1e85916935be9b184e519b8f91283f3611d
SHA256f4df4ac22925b8352cf9d07df9b8ca7f1cc76af4917e4afbe8855657ac723ff5
SHA5129e64d76459db6be6032e44e7707bf9a26b0af1744db47e1e70df412cb9cb8a015c0d231f14691efe110dc4dfcd0ecbde76d0f21fa1c99431182b7d6c4a1262c7