Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
8d0d0673df13e82507a0314d046d2e99_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d0d0673df13e82507a0314d046d2e99_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d0d0673df13e82507a0314d046d2e99_JaffaCakes118.exe
-
Size
228KB
-
MD5
8d0d0673df13e82507a0314d046d2e99
-
SHA1
36f58cb224b8a47b8085038ac0bbcbded053ac51
-
SHA256
cf589432733948af2fb61f5e7d73ce11c91199d31530e0478f622536eaab9d72
-
SHA512
499339d96585b46813d9798824db06a9af8041cfa0f5fcbd873bceda96d7f116a1fb92de1507f6d558940944b7ce3d19acd7646ac98bb0d93519574d1c4f694a
-
SSDEEP
6144:c29pDuIqCHE28LuU4SDOZ+5H88EZeeSzbjnNu91RrqI/:cGDuxamSUDO4HfEZeeSLnA91
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lpluoz.exe -
Executes dropped EXE 1 IoCs
pid Process 1504 lpluoz.exe -
Loads dropped DLL 2 IoCs
pid Process 2540 8d0d0673df13e82507a0314d046d2e99_JaffaCakes118.exe 2540 8d0d0673df13e82507a0314d046d2e99_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /z" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /X" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /b" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /e" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /R" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /P" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /k" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /K" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /B" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /w" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /i" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /j" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /v" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /Z" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /r" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /S" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /p" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /n" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /y" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /l" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /J" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /c" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /I" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /O" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /x" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /G" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /W" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /f" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /T" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /U" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /N" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /C" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /d" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /L" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /D" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /u" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /s" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /H" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /q" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /V" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /g" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /h" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /E" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /t" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /m" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /Q" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /M" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /a" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /Y" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /A" lpluoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lpluoz = "C:\\Users\\Admin\\lpluoz.exe /o" lpluoz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpluoz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d0d0673df13e82507a0314d046d2e99_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe 1504 lpluoz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2540 8d0d0673df13e82507a0314d046d2e99_JaffaCakes118.exe 1504 lpluoz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1504 2540 8d0d0673df13e82507a0314d046d2e99_JaffaCakes118.exe 30 PID 2540 wrote to memory of 1504 2540 8d0d0673df13e82507a0314d046d2e99_JaffaCakes118.exe 30 PID 2540 wrote to memory of 1504 2540 8d0d0673df13e82507a0314d046d2e99_JaffaCakes118.exe 30 PID 2540 wrote to memory of 1504 2540 8d0d0673df13e82507a0314d046d2e99_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d0d0673df13e82507a0314d046d2e99_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8d0d0673df13e82507a0314d046d2e99_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\lpluoz.exe"C:\Users\Admin\lpluoz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5b05b4f76298171eb64ed059eeca24167
SHA1cecb358b116bfc1216e03224c2ab7613a32c6d51
SHA256c24e51c25d33db1c6d5fd2a0a950e61a141865ff8e2fcb6db4843ac5dc9991d8
SHA512d67ead6be99d95982535e3940f14960269224e713391c6d39d0ed3a2c556d37d60325f725831d1c3761b9e50580dae9254315b08767f90a326008ac93d4a4d61