Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
2c80fa493d09712299f73e7b2378aa6b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2c80fa493d09712299f73e7b2378aa6b_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c80fa493d09712299f73e7b2378aa6b_JaffaCakes118.exe
-
Size
204KB
-
MD5
2c80fa493d09712299f73e7b2378aa6b
-
SHA1
07c0be92b2534c07df134cf2773e336c0a91fd7e
-
SHA256
68fa5eea43aa47d93f67c5ab7c24f5452e6d8370a8807c37325d07e09361b18f
-
SHA512
21a50ce5e667c3340fa5d8c3c78b6204a8691d7c1e7e1e36b11dbac757cc488c8079b201c9bb1f53f7baec0c1bf8572aa1b20583840dbf299ed5bef181638a27
-
SSDEEP
1536:uHAaD30zZ3NMsOfXu7Ke9TG4yMSmcUk6lCbQvmSTpJwuqCNQR6nkX5SADkPY+GdB:kp30ZTTG4yMZc9pJSTp63Zc4t
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" riiakid.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Control Panel\International\Geo\Nation 2c80fa493d09712299f73e7b2378aa6b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2304 riiakid.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /I" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /b" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /q" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /E" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /p" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /j" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /Z" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /S" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /F" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /v" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /C" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /a" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /y" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /X" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /T" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /O" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /L" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /n" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /f" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /t" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /N" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /k" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /l" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /r" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /o" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /m" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /w" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /d" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /J" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /B" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /G" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /K" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /c" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /V" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /R" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /z" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /i" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /Y" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /W" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /e" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /u" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /g" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /D" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /h" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /H" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /U" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /M" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /x" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /A" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /s" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /P" riiakid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riiakid = "C:\\Users\\Admin\\riiakid.exe /Q" riiakid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe 2304 riiakid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 920 2c80fa493d09712299f73e7b2378aa6b_JaffaCakes118.exe 2304 riiakid.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 920 wrote to memory of 2304 920 2c80fa493d09712299f73e7b2378aa6b_JaffaCakes118.exe 85 PID 920 wrote to memory of 2304 920 2c80fa493d09712299f73e7b2378aa6b_JaffaCakes118.exe 85 PID 920 wrote to memory of 2304 920 2c80fa493d09712299f73e7b2378aa6b_JaffaCakes118.exe 85 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81 PID 2304 wrote to memory of 920 2304 riiakid.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c80fa493d09712299f73e7b2378aa6b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c80fa493d09712299f73e7b2378aa6b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\riiakid.exe"C:\Users\Admin\riiakid.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD50a38047c719a2f70c8cbf7d5dd86ccf6
SHA1886aa032216f762febc1053269ede8e7575faed1
SHA256e8589f480d1e805f7eaacb3b3fa349b0b09c1dff85ed3c6f252f107bb8e2eadb
SHA512c4b4494bd015bae27fcff23f1afb37352bcf4e06ca50a831525ccc6374cfef94ef5b1ce3fd60b2254f9ec152b39d660b42a5564b1bd7aa8393cce07805fa6e3a