Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
4065cdd35d8cc502cb9b0856db009a90_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4065cdd35d8cc502cb9b0856db009a90_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4065cdd35d8cc502cb9b0856db009a90_JaffaCakes118.exe
-
Size
396KB
-
MD5
4065cdd35d8cc502cb9b0856db009a90
-
SHA1
c873d262735c1f9925194ee2b22e5dd2a18fccdc
-
SHA256
d280b0c7d78cdbdc0b8553fe2cfe1556ed680c0e6b4211bb6fb68832b8a3f380
-
SHA512
96b4782bd496cdb41342407f3d2672d96e5dc3728998f2a50181c0256312fe662648296de00cf843b18573cc8ad1a4754e61da0fe9a042b385e2aa930bc78dbb
-
SSDEEP
6144:Tjw86qZGlBzFWYSTnEiEcVc2vKx7TCNVq1i4Upx0DKHE2ViGuPizZrpRf3WO/fwW:T886OGTpWYSTnEg/vGgEKHFgGuarpX
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tuoal.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 4065cdd35d8cc502cb9b0856db009a90_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 756 tuoal.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /r" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /h" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /l" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /n" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /L" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /U" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /J" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /z" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /G" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /K" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /w" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /D" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /R" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /d" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /j" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /a" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /N" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /O" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /H" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /y" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /B" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /W" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /i" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /T" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /S" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /t" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /E" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /g" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /k" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /F" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /p" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /q" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /s" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /u" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /I" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /A" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /Q" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /c" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /m" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /Z" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /C" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /Y" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /P" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /X" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /b" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /e" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /x" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /o" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /f" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /V" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /M" tuoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoal = "C:\\Users\\Admin\\tuoal.exe /v" tuoal.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe 756 tuoal.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1280 4065cdd35d8cc502cb9b0856db009a90_JaffaCakes118.exe 756 tuoal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1280 wrote to memory of 756 1280 4065cdd35d8cc502cb9b0856db009a90_JaffaCakes118.exe 86 PID 1280 wrote to memory of 756 1280 4065cdd35d8cc502cb9b0856db009a90_JaffaCakes118.exe 86 PID 1280 wrote to memory of 756 1280 4065cdd35d8cc502cb9b0856db009a90_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4065cdd35d8cc502cb9b0856db009a90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4065cdd35d8cc502cb9b0856db009a90_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\tuoal.exe"C:\Users\Admin\tuoal.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD5d05bc289be6f50fe2f287d3736edd59b
SHA191263121e24f1e0e239e84f5537cb3f7b1e7be01
SHA256bba2f053b7d5fbb84b4873dfe32f6d89d1ccd8fbf27369db566743a269aa27c7
SHA51235228f84fd4fb1b6d61ad828d0b8e623bf89684c60feeacc2eaf91377fb179c3cc0f327a64b56c01bde3d87db56abfd4df3bf754c56e119d908335cc2f21be1b