Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 22:36
Static task
static1
Behavioral task
behavioral1
Sample
32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe
-
Size
156KB
-
MD5
32410bbf13aa5b1fe85ae0ca73cc965b
-
SHA1
2218323fcfc69dd17f64036da61059420848c652
-
SHA256
0c2747af45baa1c6ba161bfc3551cc3d6c6cbac40390653cf6e4c9cad80e295c
-
SHA512
08c6a620f4796b91f79ab67dd078eb4f6a11028299d2315079fc0a4d308e17c43b14a61a9120e74bfc18e47715908236946e65d7c9ba87064e5bb6d886e345be
-
SSDEEP
3072:QBd1g/E2MtU7Qv0w4ZRRQMMDwtIMCeFP4ANA4oQZiE+r:SdKE2R7Qvb4tQTaCeFP4A+W4
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yuako.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2528 yuako.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /t" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /c" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /P" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /M" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /f" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /J" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /k" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /L" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /C" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /O" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /w" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /A" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /n" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /T" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /K" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /D" 32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /j" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /i" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /E" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /B" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /r" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /Y" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /a" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /e" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /S" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /y" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /v" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /G" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /x" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /W" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /b" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /Q" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /V" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /m" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /I" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /u" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /z" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /H" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /d" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /h" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /U" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /R" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /D" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /Z" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /X" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /p" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /g" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /N" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /F" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /s" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /l" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /o" yuako.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuako = "C:\\Users\\Admin\\yuako.exe /q" yuako.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4056 32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe 4056 32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe 2528 yuako.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4056 32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe 2528 yuako.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4056 wrote to memory of 2528 4056 32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe 84 PID 4056 wrote to memory of 2528 4056 32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe 84 PID 4056 wrote to memory of 2528 4056 32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\yuako.exe"C:\Users\Admin\yuako.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD57eb39658b90aa7292b52f759b330424f
SHA1c9ff2f2b41ea500a7bf0106041165fbcdb6cb843
SHA2565a59ca2234e8b8bb2b524ac0aec52d0db2bf9ffaba88ccad161ea5103aa78cd9
SHA5120707e5f2326077edc739e66ab8772e99171c9adc4480a759d248e29518bd4b0f631f374be03a54734292148d2d404dd97dec9d56244f214a757f5476875dddee