Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 06:51
Static task
static1
Behavioral task
behavioral1
Sample
2f5d51b0bd4f74af42102eb2ff363277_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2f5d51b0bd4f74af42102eb2ff363277_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2f5d51b0bd4f74af42102eb2ff363277_JaffaCakes118.exe
-
Size
88KB
-
MD5
2f5d51b0bd4f74af42102eb2ff363277
-
SHA1
cc922e53b79f1d8b80e7ed968891b6f2e891610d
-
SHA256
a951e1f4605cd9b5e902b921d6a1496dfbbddb177fcda58640bfff08444e6602
-
SHA512
a37a37fac92fedc92578702debc7f8585b6fce61a32adb055292ac6f6adb4704a24c2c09396f8b3441af915279c030f1b3da3155db2fa8f58300b106cc430e12
-
SSDEEP
768:jDFIPM9ZiddaqnObOasGEwU8Z1Rbe2kjEQJQ1H7a8zFkzqcweOEg:dI0DiCU8Z1QjEQJecweF
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xaoapa.exe -
Executes dropped EXE 1 IoCs
pid Process 2884 xaoapa.exe -
Loads dropped DLL 2 IoCs
pid Process 804 2f5d51b0bd4f74af42102eb2ff363277_JaffaCakes118.exe 804 2f5d51b0bd4f74af42102eb2ff363277_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /U" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /g" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /w" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /n" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /o" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /m" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /A" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /S" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /i" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /z" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /W" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /T" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /b" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /G" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /t" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /O" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /D" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /Y" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /j" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /E" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /q" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /x" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /P" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /f" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /I" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /d" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /p" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /Z" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /r" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /a" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /Q" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /v" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /s" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /H" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /k" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /h" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /M" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /X" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /V" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /F" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /u" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /R" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /K" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /e" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /L" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /c" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /C" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /l" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /J" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /y" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /N" xaoapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaoapa = "C:\\Users\\Admin\\xaoapa.exe /B" xaoapa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe 2884 xaoapa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 804 2f5d51b0bd4f74af42102eb2ff363277_JaffaCakes118.exe 2884 xaoapa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 804 wrote to memory of 2884 804 2f5d51b0bd4f74af42102eb2ff363277_JaffaCakes118.exe 28 PID 804 wrote to memory of 2884 804 2f5d51b0bd4f74af42102eb2ff363277_JaffaCakes118.exe 28 PID 804 wrote to memory of 2884 804 2f5d51b0bd4f74af42102eb2ff363277_JaffaCakes118.exe 28 PID 804 wrote to memory of 2884 804 2f5d51b0bd4f74af42102eb2ff363277_JaffaCakes118.exe 28 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27 PID 2884 wrote to memory of 804 2884 xaoapa.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f5d51b0bd4f74af42102eb2ff363277_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f5d51b0bd4f74af42102eb2ff363277_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\xaoapa.exe"C:\Users\Admin\xaoapa.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD579316d1ecba4cea18ca042b534c0d9f9
SHA1a4859fce087e5abd3d54bef7ec59a06d3f3e423c
SHA256e6350a3f98b806051a0c3c9b8bfaf3bc4d5d2e3cae2be7347c75bfa410168ca1
SHA5123558a5f3613db56859f349f908c37631c35067162ef468d07f75166962ce906a9577f95530417127aa7d79fb350c00d69ffb2d66efd35602cc3e9b7d84d2a82f