Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
5b9292c684078d57c6063e512f03d4f2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5b9292c684078d57c6063e512f03d4f2_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
5b9292c684078d57c6063e512f03d4f2_JaffaCakes118.exe
-
Size
136KB
-
MD5
5b9292c684078d57c6063e512f03d4f2
-
SHA1
6935488bde726b3ee3a5ccdbab0c6363cdd8987c
-
SHA256
fe511c100bca9246e02a5fc0789ad5e4f6848e57560f669051a4a6d92e96accc
-
SHA512
b7fb08828bd1343820d2e417719a87772ac177610159c0dd781a941605b38ec5950162188af781a07f18d97dd4de41b9f1e6f54fbdbc926bb6d46b96870c3e82
-
SSDEEP
1536:IsNmqXOTy6npK9x5WPjeATvbtjYYVHdzqZgIYEOCsuvn:WqX8jI93WPyAdYZgI2Csuv
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zeaxiem.exe -
Executes dropped EXE 1 IoCs
pid Process 2036 zeaxiem.exe -
Loads dropped DLL 2 IoCs
pid Process 2356 5b9292c684078d57c6063e512f03d4f2_JaffaCakes118.exe 2356 5b9292c684078d57c6063e512f03d4f2_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /U" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /h" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /b" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /B" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /Q" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /m" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /W" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /Y" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /s" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /t" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /z" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /S" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /y" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /D" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /d" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /I" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /j" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /L" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /F" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /g" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /M" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /k" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /Z" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /f" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /o" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /e" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /r" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /x" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /G" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /N" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /a" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /J" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /q" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /n" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /R" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /i" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /E" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /w" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /V" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /K" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /l" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /A" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /T" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /P" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /v" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /X" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /c" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /H" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /p" zeaxiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaxiem = "C:\\Users\\Admin\\zeaxiem.exe /O" zeaxiem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe 2036 zeaxiem.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2356 5b9292c684078d57c6063e512f03d4f2_JaffaCakes118.exe 2036 zeaxiem.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2036 2356 5b9292c684078d57c6063e512f03d4f2_JaffaCakes118.exe 30 PID 2356 wrote to memory of 2036 2356 5b9292c684078d57c6063e512f03d4f2_JaffaCakes118.exe 30 PID 2356 wrote to memory of 2036 2356 5b9292c684078d57c6063e512f03d4f2_JaffaCakes118.exe 30 PID 2356 wrote to memory of 2036 2356 5b9292c684078d57c6063e512f03d4f2_JaffaCakes118.exe 30 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29 PID 2036 wrote to memory of 2356 2036 zeaxiem.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b9292c684078d57c6063e512f03d4f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b9292c684078d57c6063e512f03d4f2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\zeaxiem.exe"C:\Users\Admin\zeaxiem.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD50055a35c4e68ca72b2a42f80edd52487
SHA1de8a9fcebf5058bab5813a0d0672c811b7325145
SHA256b041bd7b2c75247dfa57b5aa1b863a9348db7ca3b486f5dece019f71ccd6fb76
SHA5121f3d96714befd5f89f739acf39b748b22c5d64797254d5aa66d8db3ffe01584c4d8ce0d9a2864b14bc23a88d8d7ba6cb6642b6a0db1f71301a3504df1df19110