Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe
-
Size
148KB
-
MD5
6267d5e81ea5d3350baa32ce30d12b21
-
SHA1
c23ae7cecbed53b85f9693b6eae94630f96461e9
-
SHA256
d4a91f2a077139865a7f1a47547017858720bcc3c1c34f02fffa0ebd86e20942
-
SHA512
bc6483d78e53bf95738ed3d91cd6d00539cd7736f3fc29974a843a3e3da49d1f5493cb7ff908a69d9eb4f67a09e36474e62a45c0297534d10b1057a2230b1265
-
SSDEEP
3072:gdo+ogRs59j/pvkqBBac+RAGq1bg7Yfgst6OzOS79pgRZkhQJAOAZ4oQZiECH:OoFbj/pvkqBBac+RAGq1bZHtrzOS77k6
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qoopu.exe -
Executes dropped EXE 1 IoCs
pid Process 2952 qoopu.exe -
Loads dropped DLL 2 IoCs
pid Process 2064 6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe 2064 6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /y" 6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /C" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /P" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /k" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /B" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /q" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /c" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /I" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /K" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /X" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /a" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /r" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /i" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /s" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /T" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /R" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /h" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /E" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /F" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /b" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /W" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /p" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /d" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /G" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /g" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /Q" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /J" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /Y" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /N" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /f" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /L" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /A" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /t" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /o" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /m" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /v" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /Z" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /l" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /V" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /n" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /H" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /M" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /e" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /j" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /O" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /x" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /u" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /D" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /U" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /z" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /w" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /y" qoopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoopu = "C:\\Users\\Admin\\qoopu.exe /S" qoopu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2064 6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe 2952 qoopu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2064 6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe 2952 qoopu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2952 2064 6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe 30 PID 2064 wrote to memory of 2952 2064 6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe 30 PID 2064 wrote to memory of 2952 2064 6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe 30 PID 2064 wrote to memory of 2952 2064 6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6267d5e81ea5d3350baa32ce30d12b21_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\qoopu.exe"C:\Users\Admin\qoopu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5cb0b8271a1c86510664bc77579fc14d5
SHA1d6b268ec403e7e982c51f8b81131dd89e6284738
SHA2562fd76f0a05770ec4c3f9372416d42f046a7f57d08769d063b1fcbda3ff01a883
SHA5127b65f4c2adde2f88f3c8a80b571edff9e883e41163febfa8d201ab0a2b52c3b77d985eb7ccfe626f0ef19fc584ceb1d42bc7625b50a679f4b34a68894bdaef34