Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 18:15
Static task
static1
Behavioral task
behavioral1
Sample
35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe
-
Size
148KB
-
MD5
35d65e8ba035d263fbeef1f3c3caa2ce
-
SHA1
48ed94ccf712f729afa50ba05118dc946310dd6c
-
SHA256
6319505a01ccd92df083f5b8a84b9063618b607012798fef855166c637d7ad1d
-
SHA512
3a977c47f1dd128976cf5ea9b2a3c2ee6693ad3ac0b368e89459d17024f534c84a67e8adab71c04223dd4bfa0ffb87dff0c1f5ed42349fb01c13e75b1bfc09b5
-
SSDEEP
3072:Odo+QgRs59j/pvkqBBac+RAGq1bg7Yfgst6OzOS79pNRZkhQJAOAU4oQZiEr0vJ:kodbj/pvkqBBac+RAGq1bZHtrzOS77Xb
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kualaf.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 kualaf.exe -
Loads dropped DLL 2 IoCs
pid Process 2356 35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe 2356 35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /S" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /Q" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /C" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /w" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /i" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /g" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /E" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /x" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /m" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /L" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /z" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /I" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /G" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /s" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /W" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /r" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /y" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /f" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /Y" 35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /a" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /e" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /l" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /K" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /R" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /D" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /k" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /P" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /Y" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /H" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /t" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /F" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /n" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /J" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /h" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /v" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /A" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /c" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /Z" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /q" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /u" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /d" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /b" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /X" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /U" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /p" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /j" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /N" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /M" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /O" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /V" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /T" kualaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\kualaf = "C:\\Users\\Admin\\kualaf.exe /o" kualaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2356 35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe 2756 kualaf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2356 35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe 2756 kualaf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2756 2356 35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe 30 PID 2356 wrote to memory of 2756 2356 35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe 30 PID 2356 wrote to memory of 2756 2356 35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe 30 PID 2356 wrote to memory of 2756 2356 35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\35d65e8ba035d263fbeef1f3c3caa2ce_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\kualaf.exe"C:\Users\Admin\kualaf.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5985feb1f31f81c2c9594d8bde72e5c4c
SHA1010db6a3370275fd238613f359c0b6a1b425593b
SHA2567dfa5f5678568bfb7889746973f6861dcbdd74a971fe9ee4fc1bbca161479d69
SHA5125a33930fa82f3665bb308b70faeb75a8c29f93d905427886ee6efdf9013abcd2e05eebabe82cbfdb0e5d83a4f2172867361c55d8e46a060a3029d10fad22803f