Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
8546ae6afd50db63969b5573dab11d48_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8546ae6afd50db63969b5573dab11d48_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8546ae6afd50db63969b5573dab11d48_JaffaCakes118.exe
-
Size
111KB
-
MD5
8546ae6afd50db63969b5573dab11d48
-
SHA1
56da8b8af41b914ebd95f600b23b8c0fe1162444
-
SHA256
5066a7a7b97fed3e1bc4389a505ca6baa0ff5fe3b96688823180d565d5ce1095
-
SHA512
e1eefdb3b233ad93dc567d910a17a684b0b36f8b16acd7e02a96c43a9f6e5b0880d208194f5119dd77526973c22361d03d707187b1419db494297ae6c1cfb682
-
SSDEEP
3072:11Mvqz2xp4D4dMz4n4N4t4R4aEIIIIzI:11MvtxMdEIIIIz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" reoahij.exe -
Executes dropped EXE 1 IoCs
pid Process 2780 reoahij.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 8546ae6afd50db63969b5573dab11d48_JaffaCakes118.exe 3040 8546ae6afd50db63969b5573dab11d48_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\reoahij = "C:\\Users\\Admin\\reoahij.exe" reoahij.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8546ae6afd50db63969b5573dab11d48_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reoahij.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe 2780 reoahij.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3040 8546ae6afd50db63969b5573dab11d48_JaffaCakes118.exe 2780 reoahij.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2780 3040 8546ae6afd50db63969b5573dab11d48_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2780 3040 8546ae6afd50db63969b5573dab11d48_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2780 3040 8546ae6afd50db63969b5573dab11d48_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2780 3040 8546ae6afd50db63969b5573dab11d48_JaffaCakes118.exe 30 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29 PID 2780 wrote to memory of 3040 2780 reoahij.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8546ae6afd50db63969b5573dab11d48_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8546ae6afd50db63969b5573dab11d48_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\reoahij.exe"C:\Users\Admin\reoahij.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD53a9b063d084cbf335fc7bc550e82bf71
SHA1856afd8ae2909851b7f7c55de5b3e6e3c91a377c
SHA256fe680e0ea38416fca3ac9c71a73247caea96f3306cf2e40e89882029cef238b9
SHA51241b9d0cae65c8f91738951d81bc480ec756121305068fb002e897ac7b64c25e46127124039dc089dfb2dc14da0dd4d26e8037a2dbb429bc24924707ae695e580