Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe
-
Size
100KB
-
MD5
8977ca77e06d466d89c065d6791caa2d
-
SHA1
06e2f215313a6f44e75f7c7f1354845b3c80b83a
-
SHA256
23bc4f56fe2afe8d4682df3f0b24a87ee82b2bfb79655d598a2e2906060c98da
-
SHA512
342f340365fa05ab496f1f0a87ef79be9f4cd74768fc306b3d213f8a3d72de01a0bb95ab31bccaf3f61ca1a55216f2d4b26577366425125a613dfeebcba0ce53
-
SSDEEP
1536:ZJW3cX220mQa9xJKIRGWcOUP7vXArnY1ZqAefzyes5NIjnZvd:fLQnNAfzyeuCnld
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" daegiog.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4676 daegiog.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /p" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /M" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /g" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /l" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /G" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /N" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /d" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /y" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /m" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /n" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /i" 8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /z" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /A" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /e" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /O" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /H" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /R" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /v" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /L" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /Z" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /i" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /t" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /c" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /E" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /P" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /a" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /D" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /V" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /s" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /B" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /C" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /o" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /Q" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /x" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /r" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /k" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /b" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /h" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /f" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /J" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /Y" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /U" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /S" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /q" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /T" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /K" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /j" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /w" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /F" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /W" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /X" daegiog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daegiog = "C:\\Users\\Admin\\daegiog.exe /I" daegiog.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daegiog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3968 8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe 3968 8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe 4676 daegiog.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3968 8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe 4676 daegiog.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3968 wrote to memory of 4676 3968 8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe 91 PID 3968 wrote to memory of 4676 3968 8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe 91 PID 3968 wrote to memory of 4676 3968 8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8977ca77e06d466d89c065d6791caa2d_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\daegiog.exe"C:\Users\Admin\daegiog.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4676
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD557329c60bbc8d1d868029ed1bf230657
SHA1c9bb4b5c62306c21e07b03027d221becccd008cd
SHA256c5bb2a96f5087eb0f8d165210801eb35f159db7f82e98de227f969c2f0a68ca8
SHA512e59d084e6d6eb2568c870a32c80b820e5fad54f651f07e9a29dfd2be5e7ea0132fa7cf6a5420bfb669c038d12932dd22955483b619d0118a7f5d2d75da3d981d