Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
31c3c383aa66654e563aa8dc0b290c09_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
31c3c383aa66654e563aa8dc0b290c09_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
31c3c383aa66654e563aa8dc0b290c09_JaffaCakes118.exe
-
Size
96KB
-
MD5
31c3c383aa66654e563aa8dc0b290c09
-
SHA1
64a0981ea6a43dde76b9d3cacf50618a14837f75
-
SHA256
e9ea087fa4680befe0cb8900afcd1da3bd17b68d41c97d6808773da265b0e7f4
-
SHA512
5d09dbc413833df318413f474713379fc0fa596d42f7e41b8e326183876168926960db512c7d5d25b106aaf80e566722e640ca59ba9b1f28db97ba9ba7230e1c
-
SSDEEP
1536:XmQBHQf6cO/hawkGulSc16l6u+NMMl/KlYv1Tq5ThFfNIjnZHL:xbh0lu8CFFfCn1L
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 31c3c383aa66654e563aa8dc0b290c09_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" moaruaf.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation 31c3c383aa66654e563aa8dc0b290c09_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3804 moaruaf.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /d" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /q" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /u" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /a" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /b" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /Y" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /h" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /B" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /K" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /k" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /E" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /x" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /j" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /w" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /s" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /P" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /g" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /Q" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /G" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /M" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /l" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /C" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /U" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /t" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /L" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /X" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /W" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /f" 31c3c383aa66654e563aa8dc0b290c09_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /i" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /T" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /p" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /H" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /R" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /v" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /F" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /V" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /m" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /f" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /J" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /N" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /n" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /I" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /r" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /c" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /S" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /y" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /A" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /e" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /z" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /D" moaruaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moaruaf = "C:\\Users\\Admin\\moaruaf.exe /o" moaruaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2836 31c3c383aa66654e563aa8dc0b290c09_JaffaCakes118.exe 2836 31c3c383aa66654e563aa8dc0b290c09_JaffaCakes118.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe 3804 moaruaf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2836 31c3c383aa66654e563aa8dc0b290c09_JaffaCakes118.exe 3804 moaruaf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2836 wrote to memory of 3804 2836 31c3c383aa66654e563aa8dc0b290c09_JaffaCakes118.exe 84 PID 2836 wrote to memory of 3804 2836 31c3c383aa66654e563aa8dc0b290c09_JaffaCakes118.exe 84 PID 2836 wrote to memory of 3804 2836 31c3c383aa66654e563aa8dc0b290c09_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\31c3c383aa66654e563aa8dc0b290c09_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\31c3c383aa66654e563aa8dc0b290c09_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\moaruaf.exe"C:\Users\Admin\moaruaf.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ce725aa5f3f58e01a36441294edf1fec
SHA1dd2fee955625bb75468ae28370f8c23b9b128122
SHA2563f6ac2b9eb7c904cba42448e4058db643ddc18703859b366e8f31a20dae624be
SHA512cc83f7a8a34a5752d7cb49ee7d866f36fae43ce05ceb226bf31ac46f3e63cbc5e99a2d407a23d988dfa085172d9e97bf50d11ae47d602868ede62c5d5ccd22cc