Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
5d3119d42b65438aaabb8c06107f615a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5d3119d42b65438aaabb8c06107f615a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d3119d42b65438aaabb8c06107f615a_JaffaCakes118.exe
-
Size
252KB
-
MD5
5d3119d42b65438aaabb8c06107f615a
-
SHA1
fde901ea1af524c70cd663be6ca0158e779b8a09
-
SHA256
df46aa10ff3b8e1dde42304c743e09aeeb54ca4c617643a6ab4a02feebae7cea
-
SHA512
852d2532682fbee6f7087ee9f8f3dded4f24fe7811c756267037cce8aff096a3f9afce6360fa45b193bc218d1befe5b363542a14a8d8866523206b2a4954a47b
-
SSDEEP
1536:5JIwL0QzsIRbgE3vo97thU0CNY+cdoFlVxEz/c2JYO8VUmnbfzFHfz8sFBpYWC/O:Dl0QrgYg9bVtgfzFHfzb51QRPr8GDiw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jaizap.exe -
Executes dropped EXE 1 IoCs
pid Process 2524 jaizap.exe -
Loads dropped DLL 2 IoCs
pid Process 2564 5d3119d42b65438aaabb8c06107f615a_JaffaCakes118.exe 2564 5d3119d42b65438aaabb8c06107f615a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /H" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /G" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /d" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /p" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /A" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /K" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /k" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /i" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /L" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /Y" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /r" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /I" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /U" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /W" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /n" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /u" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /o" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /t" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /w" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /e" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /O" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /P" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /Z" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /c" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /Q" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /J" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /f" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /l" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /b" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /m" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /V" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /S" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /v" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /j" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /R" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /M" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /X" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /z" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /B" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /T" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /q" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /C" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /h" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /s" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /x" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /E" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /g" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /D" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /a" jaizap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaizap = "C:\\Users\\Admin\\jaizap.exe /N" jaizap.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe 2524 jaizap.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2564 5d3119d42b65438aaabb8c06107f615a_JaffaCakes118.exe 2524 jaizap.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2524 2564 5d3119d42b65438aaabb8c06107f615a_JaffaCakes118.exe 30 PID 2564 wrote to memory of 2524 2564 5d3119d42b65438aaabb8c06107f615a_JaffaCakes118.exe 30 PID 2564 wrote to memory of 2524 2564 5d3119d42b65438aaabb8c06107f615a_JaffaCakes118.exe 30 PID 2564 wrote to memory of 2524 2564 5d3119d42b65438aaabb8c06107f615a_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29 PID 2524 wrote to memory of 2564 2524 jaizap.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d3119d42b65438aaabb8c06107f615a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d3119d42b65438aaabb8c06107f615a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\jaizap.exe"C:\Users\Admin\jaizap.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD51ef1b8cd919d4393e40660f9397d3ab9
SHA1c20ab2d3b7cbc82288c630568f66efd0addd1ee0
SHA2562f499e745849493b3d633acdeb4be31d9e1ae2021704475812da1f0fc4b9ec3d
SHA51227c28dca448471c4fcd1b86c35256a97db29926cf1afc9b2a1a411bf4469b59fdacb3c5e9131bb0167ee87bbd19a4436c6d5f2360757809e6fb77171dd30fea0