Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
31b892f4f56f200cb49f241a79d06d85_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
31b892f4f56f200cb49f241a79d06d85_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
31b892f4f56f200cb49f241a79d06d85_JaffaCakes118.exe
-
Size
48KB
-
MD5
31b892f4f56f200cb49f241a79d06d85
-
SHA1
45b680813b1aa685508acb3cac54cb3ffcd3fa99
-
SHA256
d53257a23fd3c2952c9968654e1161271299a8121d7e86f4ed6f8afe8155a09d
-
SHA512
2fc5960c5258acc0660def66b38d749f84a21beb588dd06542c3e7a94286891d09c6ff84230ae0d79a14bd13c3962e575138b4de9f796cfa24c99375bbd1992f
-
SSDEEP
768:SANEhmWggFcXsv+6wH9H7MfygXaDMFQXD7e:SAam6FcXa6NNDsQXD7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" woaurud.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 31b892f4f56f200cb49f241a79d06d85_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2812 woaurud.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woaurud = "C:\\Users\\Admin\\woaurud.exe" woaurud.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe 2812 woaurud.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3028 31b892f4f56f200cb49f241a79d06d85_JaffaCakes118.exe 2812 woaurud.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2812 3028 31b892f4f56f200cb49f241a79d06d85_JaffaCakes118.exe 86 PID 3028 wrote to memory of 2812 3028 31b892f4f56f200cb49f241a79d06d85_JaffaCakes118.exe 86 PID 3028 wrote to memory of 2812 3028 31b892f4f56f200cb49f241a79d06d85_JaffaCakes118.exe 86 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82 PID 2812 wrote to memory of 3028 2812 woaurud.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\31b892f4f56f200cb49f241a79d06d85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\31b892f4f56f200cb49f241a79d06d85_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\woaurud.exe"C:\Users\Admin\woaurud.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD59d50d7e467d8b09d66e07a0546d3f871
SHA17fb317faceea0a3186f4b07bb4a6bdd0daa0697e
SHA256825d7b8e398d683c8b14409c8f2616715bbdcc10b3ff936073617980d8618bc3
SHA512e33ff97cb4a7a897bd56ccb68e9532e1b8e8eae32a0c443b86c0760eaba62e49ca2a10024f85d2513aaf2c14c9df7eecca537313dc0250a161a7a53de074b16f