Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe
-
Size
300KB
-
MD5
4b29ac480825aee210b76c9605a990ca
-
SHA1
d1ac95d3a8a36721d1cb170d4936ead89169e468
-
SHA256
dfaccc42dbd490b877cfd84e47d21fb18a3439eeeeea6c161be179e8deb55923
-
SHA512
ac0c826d5adb6c3b2575b035c1b288b8eace63956cae4d7df23d4b9431035e4ec3de64c70e1df5e974eca91ffd1c32e0cc2ca876e225098a0caa676f1f41f903
-
SSDEEP
6144:vA+usKuzNSYokX6w1UbgwDO7zRpmM57M186xFGY:IOKuzNSYQEY
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vueagoq.exe -
Executes dropped EXE 1 IoCs
pid Process 1520 vueagoq.exe -
Loads dropped DLL 2 IoCs
pid Process 3028 4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe 3028 4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /u" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /e" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /k" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /l" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /x" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /t" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /n" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /g" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /p" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /d" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /j" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /b" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /w" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /u" 4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /v" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /c" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /m" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /y" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /q" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /f" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /z" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /a" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /s" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /i" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /o" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /h" vueagoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueagoq = "C:\\Users\\Admin\\vueagoq.exe /r" vueagoq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3028 4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe 1520 vueagoq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3028 4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe 1520 vueagoq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1520 3028 4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe 30 PID 3028 wrote to memory of 1520 3028 4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe 30 PID 3028 wrote to memory of 1520 3028 4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe 30 PID 3028 wrote to memory of 1520 3028 4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b29ac480825aee210b76c9605a990ca_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\vueagoq.exe"C:\Users\Admin\vueagoq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD5e2844703796662d5888f5923e5d2e322
SHA19eb182ce510c3058a642a26bb4738aaee08cdcdd
SHA25624ea0c1976b423c7e426720613eab000590d6e23ca192932e6f37b6e9aa2b5a3
SHA51245214920ea0ccff8bc68c27021309b204566e30affa0f6e6c947089e93eca6a8a8e054f85b473f58ffa8bb5d8afaf8c6cc3b25fda166072ed0ea0f3351f47009