Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 09:07
Static task
static1
Behavioral task
behavioral1
Sample
5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe
-
Size
240KB
-
MD5
5b48a26b6fd4dfd153fc64d7939cd7f6
-
SHA1
be73425215a7012cdb167553bbf60c5d99c5567f
-
SHA256
84abfda09efe8c84e4d64af4e528aad92e09978d8e245c78679882a9b049ef9e
-
SHA512
16f803ef2ea6f2758d91b3512438b516fd2e34d6cb54d287f86b5e4cb0c8804747030037013b0a3eb5471c99636bf0757dd72e849ce53cd9401b7c31ff7a52f8
-
SSDEEP
6144:sUi3dwqsNwemAB0EqxF6snji81RUinKchhy+S3n:YdQQJsZ3
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" koxer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2304 koxer.exe -
Loads dropped DLL 2 IoCs
pid Process 2104 5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe 2104 5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /c" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /l" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /j" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /e" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /w" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /i" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /z" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /o" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /t" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /d" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /y" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /p" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /x" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /u" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /m" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /r" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /k" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /g" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /q" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /f" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /v" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /b" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /s" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /n" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /w" 5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /a" koxer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\koxer = "C:\\Users\\Admin\\koxer.exe /h" koxer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2104 5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe 2304 koxer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2104 5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe 2304 koxer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2304 2104 5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe 30 PID 2104 wrote to memory of 2304 2104 5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe 30 PID 2104 wrote to memory of 2304 2104 5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe 30 PID 2104 wrote to memory of 2304 2104 5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b48a26b6fd4dfd153fc64d7939cd7f6_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\koxer.exe"C:\Users\Admin\koxer.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5d7046c4a7cd137ee544c87b5c27ff1d1
SHA1691edc672312b1e7862ca0ed01cb481ab0a5ccf3
SHA2567341ef52285f8593e82111fe73a6a75ce9bdb2d89d96fbe14282e31361548a2a
SHA512e9771002d8b23cffc9c0e1c7235d5370a8adfbbcc96d8461cf46f15bceeb9cf92f89e97f71a4e4f4b05d74b84e767212edba3b74a31d74db00f780fc7ef3abb3