Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 11:12
Static task
static1
Behavioral task
behavioral1
Sample
5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe
-
Size
156KB
-
MD5
5bb1b51f497b8ab025bdb4d0305d177d
-
SHA1
cbb6d975e6c5c2513e04eb3b249b24043a101927
-
SHA256
c4b32f6fc9b8f78d79b00cd40efada235d08ff7077fb4a183c11772b5daf36b9
-
SHA512
683a884ea95df5ad43a09cf786cfbe0c86e24843fb60a64370e329e1ca7325a6d7e4e31c6d6a2ef08c0ceb08572d284a2705f3c8f060e0fd82e0764e25504f33
-
SSDEEP
3072:xANPhL3YsZtSxch3Z1C5GbWyleXkbxy6cg48Af4oQZiEh3:+PhcsZ5b1OGbU0NByhWL
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" geujouw.exe -
Executes dropped EXE 1 IoCs
pid Process 2748 geujouw.exe -
Loads dropped DLL 2 IoCs
pid Process 2280 5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe 2280 5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /s" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /i" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /s" 5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /j" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /I" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /Z" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /t" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /m" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /v" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /g" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /p" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /Y" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /q" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /A" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /n" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /R" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /o" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /z" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /f" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /W" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /K" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /J" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /M" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /x" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /w" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /N" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /G" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /V" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /D" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /b" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /e" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /d" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /a" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /T" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /O" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /X" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /P" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /u" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /C" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /Q" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /S" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /h" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /F" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /L" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /E" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /y" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /B" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /H" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /c" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /l" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /k" geujouw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\geujouw = "C:\\Users\\Admin\\geujouw.exe /r" geujouw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2280 5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe 2748 geujouw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2280 5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe 2748 geujouw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2748 2280 5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2748 2280 5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2748 2280 5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe 30 PID 2280 wrote to memory of 2748 2280 5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\geujouw.exe"C:\Users\Admin\geujouw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5b8f884ef9b186b692a4de390fa4dc02c
SHA17781e61c2ab5e85c331704d1722db43ee3b3a932
SHA256b525a1f1a2345a57219fef47f5c265008a9b9cb3485f8e52fdf993d62342e868
SHA51205601d77f33e1b9995d75682580bfbfbc1c6d63eb5da3f6a4dd0f4ad26cbe01e22de0165200fb951559503bdb9a2a0711f27b42b8809859081504c6476b5a194