Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 16:42
Static task
static1
Behavioral task
behavioral1
Sample
2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe
-
Size
268KB
-
MD5
2d127273a41f958ac516d75c5f886378
-
SHA1
b6f5b267a072a2de32e6f4172e79dcbf08f1bdae
-
SHA256
1d4fca44ac6fb27d185eda84e3aee77378667696e85c42ff997df47c1b57b697
-
SHA512
009039e59461fe2ef580c668ec78c84366e70c48650deef9b71ec1070fc613a277d090939cb6bdc43078d74aeb0630a0e876d0f7678ee72da0138e352c7c882a
-
SSDEEP
6144:kl6PHPr5dFvW8HGzNz8I4vDWsQKcSnuXLH6M4hvB:I6PHVdFvW8Hu/4vDK/XLGhvB
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kiqik.exe -
Executes dropped EXE 1 IoCs
pid Process 2100 kiqik.exe -
Loads dropped DLL 2 IoCs
pid Process 592 2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe 592 2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /t" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /s" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /b" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /w" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /n" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /l" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /f" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /q" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /d" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /z" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /k" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /e" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /u" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /p" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /g" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /y" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /i" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /v" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /m" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /x" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /j" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /a" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /k" 2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /r" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /c" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /o" kiqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiqik = "C:\\Users\\Admin\\kiqik.exe /h" kiqik.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 592 2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe 2100 kiqik.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 592 2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe 2100 kiqik.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 592 wrote to memory of 2100 592 2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe 29 PID 592 wrote to memory of 2100 592 2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe 29 PID 592 wrote to memory of 2100 592 2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe 29 PID 592 wrote to memory of 2100 592 2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d127273a41f958ac516d75c5f886378_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\kiqik.exe"C:\Users\Admin\kiqik.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD56a7899b27252859dbd747b89ef8d59ca
SHA1fe5c6da7e7a70232d09f30fbe5844508ad8237ba
SHA25687d14998c940b8d8ab41c8ad64b3091f5c15f93f539c6f5870789dccf9c64fba
SHA512e8de02a87135b823954fa52fd17d04f6388bd513b711c80b249e42f2d5ae285eae68320937623c74917e4ef8033ef4a06957fe3868c2fbaa47d0eba34557ee45