Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
48cf37fb843093e1c364d8482be80c79_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
48cf37fb843093e1c364d8482be80c79_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
48cf37fb843093e1c364d8482be80c79_JaffaCakes118.exe
-
Size
88KB
-
MD5
48cf37fb843093e1c364d8482be80c79
-
SHA1
2cc0b32ccc8070a16613153d5c8b25378b4cbed7
-
SHA256
982d7317f48346260d86e45a231674bdbe488192851f7a36244a11fc414f47ff
-
SHA512
5847aa8a8460ecd5559510a425933803e270672fb4001ca692f91d3c07a0967e84bc25b9da82ee2bdc40f2de3da7793e81299bffbf96b68adf68d4f627da1614
-
SSDEEP
768:zDFIvM+ddaqnObOasGEwU8Z1Rbe2kjEQJQ1H7a8zFkzqcwOll:tIUviCU8Z1QjEQJecwOl
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ptzow.exe -
Executes dropped EXE 1 IoCs
pid Process 2072 ptzow.exe -
Loads dropped DLL 2 IoCs
pid Process 884 48cf37fb843093e1c364d8482be80c79_JaffaCakes118.exe 884 48cf37fb843093e1c364d8482be80c79_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /G" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /o" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /m" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /W" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /e" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /z" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /Y" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /V" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /T" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /r" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /O" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /k" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /K" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /B" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /w" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /n" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /f" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /P" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /N" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /v" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /y" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /b" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /C" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /R" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /I" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /E" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /Q" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /D" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /Z" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /a" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /H" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /j" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /x" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /S" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /c" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /h" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /M" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /i" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /J" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /A" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /p" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /s" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /u" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /X" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /F" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /d" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /l" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /U" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /t" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /g" ptzow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ptzow = "C:\\Users\\Admin\\ptzow.exe /L" ptzow.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe 2072 ptzow.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 884 48cf37fb843093e1c364d8482be80c79_JaffaCakes118.exe 2072 ptzow.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 884 wrote to memory of 2072 884 48cf37fb843093e1c364d8482be80c79_JaffaCakes118.exe 30 PID 884 wrote to memory of 2072 884 48cf37fb843093e1c364d8482be80c79_JaffaCakes118.exe 30 PID 884 wrote to memory of 2072 884 48cf37fb843093e1c364d8482be80c79_JaffaCakes118.exe 30 PID 884 wrote to memory of 2072 884 48cf37fb843093e1c364d8482be80c79_JaffaCakes118.exe 30 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29 PID 2072 wrote to memory of 884 2072 ptzow.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\48cf37fb843093e1c364d8482be80c79_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\48cf37fb843093e1c364d8482be80c79_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\ptzow.exe"C:\Users\Admin\ptzow.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5da87a720157aa9d2d14265acbf06b284
SHA183a68157cc3ff8497dda6c2f78f67a1e923e80a1
SHA2565931f5723f0e66f8612bb9e0cc013467ffaf28d1b09db3018bd332846d865935
SHA512aca3da5f02981b76a6c39dc4dd4dba8c2d90e6587c170bc5390db5503bafbbc811eacbb0894cdb9d4cfe1c11153bd04e63de24c0fa4d2017c88e09584404263e