Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
5ea2071cae4253e234811a53bc7e0725_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5ea2071cae4253e234811a53bc7e0725_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5ea2071cae4253e234811a53bc7e0725_JaffaCakes118.exe
-
Size
228KB
-
MD5
5ea2071cae4253e234811a53bc7e0725
-
SHA1
ec275ee7766e280d9fa9bb3866545b539329fa01
-
SHA256
bfe3bd0d3c83f26cf21a3c8bf0336c1589e103d6402ad13d9559522da420ffb8
-
SHA512
db80be7f6e3f846fb7fc672e45d375a5add6b40ee489c140946413d262cb283574e1bf5180e9218c65c47a8f4e7c33393e122efdf30a3dcfb15a5d8cbcb3ff26
-
SSDEEP
6144:3KhB3dwqsNy5ibpNjlDEqxF6snji81RUinKNCD9:ahNdQxlj
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5ea2071cae4253e234811a53bc7e0725_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" baibes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 5ea2071cae4253e234811a53bc7e0725_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1124 baibes.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /a" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /q" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /p" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /n" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /x" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /t" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /y" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /g" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /u" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /i" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /c" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /r" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /m" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /j" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /v" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /h" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /w" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /o" 5ea2071cae4253e234811a53bc7e0725_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /d" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /s" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /k" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /b" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /e" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /z" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /f" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /l" baibes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baibes = "C:\\Users\\Admin\\baibes.exe /o" baibes.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4516 5ea2071cae4253e234811a53bc7e0725_JaffaCakes118.exe 4516 5ea2071cae4253e234811a53bc7e0725_JaffaCakes118.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe 1124 baibes.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4516 5ea2071cae4253e234811a53bc7e0725_JaffaCakes118.exe 1124 baibes.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4516 wrote to memory of 1124 4516 5ea2071cae4253e234811a53bc7e0725_JaffaCakes118.exe 91 PID 4516 wrote to memory of 1124 4516 5ea2071cae4253e234811a53bc7e0725_JaffaCakes118.exe 91 PID 4516 wrote to memory of 1124 4516 5ea2071cae4253e234811a53bc7e0725_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ea2071cae4253e234811a53bc7e0725_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5ea2071cae4253e234811a53bc7e0725_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\baibes.exe"C:\Users\Admin\baibes.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5eda640694da1e86b5506c6dd46a5a63c
SHA1c76f7e21e89ebbcde006206116dfa957529466b5
SHA256369f7deb3856f2bc1d126686f375c7e4609499aebeda8cdacc12ab4fb20c4d43
SHA512c42913c1326980fed57d4d699fb36302260844aee4675deda96d338cbfb0d117f115b8491ef09d4ebc10859597f924e7226db987fd275520bc89974ae6157547