Analysis
-
max time kernel
149s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 00:23
Static task
static1
Behavioral task
behavioral1
Sample
43cab7ddf0a1de8fdbacbe3e0f2f7612_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43cab7ddf0a1de8fdbacbe3e0f2f7612_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
43cab7ddf0a1de8fdbacbe3e0f2f7612_JaffaCakes118.exe
-
Size
168KB
-
MD5
43cab7ddf0a1de8fdbacbe3e0f2f7612
-
SHA1
b5620efa752815294d7f360f3df0a61d426f0eb8
-
SHA256
1ca6a6a3e84ac62729da915d19e657a5b62232814a1f9ea17e914212e09dad15
-
SHA512
13a02b933d4c0a44d882e22a09d9b92ad42f545944a0bcf803e03b457a7075aef31e8aa7a3732b72087ffed23f3150c1c22e7ad8a736e6fa6e915bd474368bd5
-
SSDEEP
3072:zhGs81+crY7SIsyeTlo/11hJl2czGRqxZdxxW9ZI:zhGD1+yYi/lS1NJG6/x
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 43cab7ddf0a1de8fdbacbe3e0f2f7612_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qqkek.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 43cab7ddf0a1de8fdbacbe3e0f2f7612_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3128 qqkek.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /y" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /p" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /h" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /P" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /e" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /o" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /c" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /w" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /q" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /A" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /I" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /x" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /V" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /d" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /B" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /J" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /b" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /i" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /s" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /y" 43cab7ddf0a1de8fdbacbe3e0f2f7612_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /K" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /N" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /n" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /g" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /Z" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /Q" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /L" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /O" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /f" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /z" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /j" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /r" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /G" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /D" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /F" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /v" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /C" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /U" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /M" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /t" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /m" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /H" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /Y" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /a" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /W" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /l" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /k" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /R" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /X" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /u" qqkek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qqkek = "C:\\Users\\Admin\\qqkek.exe /T" qqkek.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4948 43cab7ddf0a1de8fdbacbe3e0f2f7612_JaffaCakes118.exe 4948 43cab7ddf0a1de8fdbacbe3e0f2f7612_JaffaCakes118.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe 3128 qqkek.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4948 43cab7ddf0a1de8fdbacbe3e0f2f7612_JaffaCakes118.exe 3128 qqkek.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 3128 4948 43cab7ddf0a1de8fdbacbe3e0f2f7612_JaffaCakes118.exe 86 PID 4948 wrote to memory of 3128 4948 43cab7ddf0a1de8fdbacbe3e0f2f7612_JaffaCakes118.exe 86 PID 4948 wrote to memory of 3128 4948 43cab7ddf0a1de8fdbacbe3e0f2f7612_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\43cab7ddf0a1de8fdbacbe3e0f2f7612_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43cab7ddf0a1de8fdbacbe3e0f2f7612_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\qqkek.exe"C:\Users\Admin\qqkek.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5f2499ae44686c54205fa2073fae31686
SHA17af4a845d53c397fa6146e73052267ec2cf5794a
SHA2565b8420a7750cc30173d2a0454adf895e2aa7b225c8c95105fe84f21b32615495
SHA5127027bcf0d94947e3e083afe7a6e831fcf52c612cf1e8d636ca9a36efd11cf85f85e44fa0e2272782a4ae4dbb4c975064ad2fece4af933855fac5023dd821549b