Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
5e891c5112db764f2d9ad64db33a2501_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5e891c5112db764f2d9ad64db33a2501_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e891c5112db764f2d9ad64db33a2501_JaffaCakes118.exe
-
Size
128KB
-
MD5
5e891c5112db764f2d9ad64db33a2501
-
SHA1
d84f3d1d33e89bbf6dff5db3d1e3328ebe37712d
-
SHA256
fe5c81ddf72b3508b8f7b1a5dcb6399b25cff59491b8e695cab06059b575a5f1
-
SHA512
163c17676d154a3e6a3cf9e1698ce42ef5d9c219a689ea9985564c5b3e472403497feab1149cfd77410339a898e15fbf97a1e04d8d40f10fbff15bec1cb9c675
-
SSDEEP
3072:FPpF9PK3y4CpCfCGCCOCwC9CvCFCfCLCvCUCLC2FInROUSRSGSuSQSmSNS4SQSs2:5c3yGFInRO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yaooq.exe -
Executes dropped EXE 1 IoCs
pid Process 1128 yaooq.exe -
Loads dropped DLL 2 IoCs
pid Process 1856 5e891c5112db764f2d9ad64db33a2501_JaffaCakes118.exe 1856 5e891c5112db764f2d9ad64db33a2501_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaooq = "C:\\Users\\Admin\\yaooq.exe" yaooq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe 1128 yaooq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1856 5e891c5112db764f2d9ad64db33a2501_JaffaCakes118.exe 1128 yaooq.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 1128 1856 5e891c5112db764f2d9ad64db33a2501_JaffaCakes118.exe 31 PID 1856 wrote to memory of 1128 1856 5e891c5112db764f2d9ad64db33a2501_JaffaCakes118.exe 31 PID 1856 wrote to memory of 1128 1856 5e891c5112db764f2d9ad64db33a2501_JaffaCakes118.exe 31 PID 1856 wrote to memory of 1128 1856 5e891c5112db764f2d9ad64db33a2501_JaffaCakes118.exe 31 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29 PID 1128 wrote to memory of 1856 1128 yaooq.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e891c5112db764f2d9ad64db33a2501_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e891c5112db764f2d9ad64db33a2501_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\yaooq.exe"C:\Users\Admin\yaooq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5c2e4880b7e23db4142a9f70b6d74f6ed
SHA12d01e2cead30f9f617b7ab76a8e4fa08e0ce9de4
SHA25645b2738fc78be02a45e81dedc288528d5bb56c0938f28804746e3f42792afe52
SHA51253cc55749cd60cd44b78416af3fd00fd0bccf3191a130877f6493403899fcac17fe719119e3fe65b7d528d9b64d541779f6893301a4728073effaa21a4531f54