Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 10:59
Static task
static1
Behavioral task
behavioral1
Sample
8a1a5d37416f7530ab622ebbf28e3e3b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8a1a5d37416f7530ab622ebbf28e3e3b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a1a5d37416f7530ab622ebbf28e3e3b_JaffaCakes118.exe
-
Size
88KB
-
MD5
8a1a5d37416f7530ab622ebbf28e3e3b
-
SHA1
5c5136b5f4b4f1a8c9c28f113e4b8eb8c8288570
-
SHA256
05b6aceb2b23059b157c54d0178100af974bda932486c8f834412464d0d18ae8
-
SHA512
5324ac8ee802f036eff815456c825b594258a2df9bf0f766861b56d4e0200e14da2abd39da225dfe758a070c923c00341a648cc5fe31a8c82dd938f04417c573
-
SSDEEP
1536:bhxnuCULyBgrLswwWGaWbWbobSbVbBbvJ1SmHZx9k1nKw7oca:91uCU1rv51IoB
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cuuoy.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 8a1a5d37416f7530ab622ebbf28e3e3b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 436 cuuoy.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /k" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /Q" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /b" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /S" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /d" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /r" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /C" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /N" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /c" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /h" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /Z" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /J" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /n" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /T" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /L" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /M" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /x" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /a" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /t" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /O" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /u" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /H" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /G" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /q" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /p" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /E" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /Y" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /P" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /z" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /D" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /w" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /g" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /I" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /W" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /i" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /e" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /y" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /X" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /A" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /m" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /R" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /o" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /U" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /j" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /V" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /l" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /f" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /F" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /s" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /B" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /K" cuuoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuuoy = "C:\\Users\\Admin\\cuuoy.exe /v" cuuoy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a1a5d37416f7530ab622ebbf28e3e3b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cuuoy.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe 436 cuuoy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 564 8a1a5d37416f7530ab622ebbf28e3e3b_JaffaCakes118.exe 436 cuuoy.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 564 wrote to memory of 436 564 8a1a5d37416f7530ab622ebbf28e3e3b_JaffaCakes118.exe 88 PID 564 wrote to memory of 436 564 8a1a5d37416f7530ab622ebbf28e3e3b_JaffaCakes118.exe 88 PID 564 wrote to memory of 436 564 8a1a5d37416f7530ab622ebbf28e3e3b_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a1a5d37416f7530ab622ebbf28e3e3b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a1a5d37416f7530ab622ebbf28e3e3b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\cuuoy.exe"C:\Users\Admin\cuuoy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:436
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD544dafabbc1989281031d17db7a81c73e
SHA147b0c0a1fc59ea68a7130c33f89913b7ca157807
SHA2564e93fb6eedb58f7f22bfaeeaaee7b8b3004784f1ea4a9d889cfe529c94ca2d5e
SHA5127d2b86ec6bd51c24b0492a1afce607cc0d73f94e75b567ea5a40a119e8d2bb4c27be087dd9d757abf963649e322de4b4bd42c30db1294fa9f5321d07a8510b9b