Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 02:00
Static task
static1
Behavioral task
behavioral1
Sample
65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe
-
Size
260KB
-
MD5
65b5feab63a5caaed4fb9a6e8f6d3cf1
-
SHA1
b7ee676f81afb11712c04907e4970535be628b5f
-
SHA256
a0b88f496b91fca5a6f9d5fc8118a90f5ee108dc9e58e80e7ab6a199722588dc
-
SHA512
89889b12987ca3ebcd0c161b0a6628b07bdaae1ad7937055ebfa1c16a871ed6855bbce089ad65baf942949cb7866166598f6b10a9d0e25a215416e7b65fbdbd3
-
SSDEEP
3072:xw9eiaxuIiE64j9a45Kf/4xLMfKdRR7yH3TFavCPQjIYQHCd8boxQVV/V3xYR:mTI/6qKWmH3TFCCoNLx+V
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" keeizi.exe -
Executes dropped EXE 1 IoCs
pid Process 1656 keeizi.exe -
Loads dropped DLL 2 IoCs
pid Process 3016 65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe 3016 65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /x" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /n" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /c" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /h" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /k" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /M" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /a" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /s" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /o" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /p" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /u" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /W" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /A" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /H" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /B" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /T" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /X" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /J" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /U" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /A" 65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /N" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /G" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /Y" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /v" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /b" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /l" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /I" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /D" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /R" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /g" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /S" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /K" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /C" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /q" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /w" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /z" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /j" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /r" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /Z" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /d" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /E" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /m" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /V" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /e" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /F" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /O" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /L" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /t" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /y" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /i" keeizi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeizi = "C:\\Users\\Admin\\keeizi.exe /P" keeizi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3016 65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe 1656 keeizi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3016 65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe 1656 keeizi.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 1656 3016 65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe 30 PID 3016 wrote to memory of 1656 3016 65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe 30 PID 3016 wrote to memory of 1656 3016 65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe 30 PID 3016 wrote to memory of 1656 3016 65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65b5feab63a5caaed4fb9a6e8f6d3cf1_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\keeizi.exe"C:\Users\Admin\keeizi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD54738ae0661d05287622b254aeba71268
SHA109b75ee776b9d66b21c5a5c37026e1bcda20878a
SHA256c39574f68e4e934b1ca4e05d639187b6a2b47047b4a09fddfb306d57dc9da7b1
SHA5121fd4ce710e07faec060fee7555bdbf914fae428ebffbe83888b78f4912c9a4e5e612808fcd47692be7f9afb8f4443473d95253992cc09a2b96374e53b3d34862