Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe
-
Size
224KB
-
MD5
8e41e73a502d14a898594ff604e2af59
-
SHA1
a54a366be4ede64c8e678cff7e37f61ab3acac70
-
SHA256
e39253de7a3c168031ce59305efd1e4dfabfa66b3d23633cab4f8caa524de44f
-
SHA512
b935157cf2c351e442c15afd8a11695d09da9f56aee144098f476f9b7abeec34a8bccbb3967fc882392ef2020d94e520959c13bcfda33de016aab154e0f4cf5b
-
SSDEEP
3072:28GQDsZ5qbLj1w+A3W66NYa7CgPCmHV1BdHDYqzUnQUodlD:2Icqvj1BA76HCgPCmHV1BdHDYoUS
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" baeiw.exe -
Executes dropped EXE 1 IoCs
pid Process 1344 baeiw.exe -
Loads dropped DLL 2 IoCs
pid Process 2080 8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe 2080 8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /t" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /B" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /y" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /Z" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /S" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /j" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /k" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /A" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /v" 8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /w" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /Y" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /h" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /V" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /p" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /R" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /F" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /D" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /n" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /G" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /o" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /v" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /z" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /N" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /r" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /u" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /x" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /U" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /T" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /b" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /I" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /J" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /P" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /L" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /Q" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /K" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /d" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /i" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /l" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /C" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /g" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /E" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /M" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /X" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /W" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /f" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /c" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /s" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /q" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /a" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /O" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /e" baeiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\baeiw = "C:\\Users\\Admin\\baeiw.exe /H" baeiw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language baeiw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2080 8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe 1344 baeiw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2080 8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe 1344 baeiw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1344 2080 8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe 31 PID 2080 wrote to memory of 1344 2080 8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe 31 PID 2080 wrote to memory of 1344 2080 8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe 31 PID 2080 wrote to memory of 1344 2080 8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e41e73a502d14a898594ff604e2af59_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\baeiw.exe"C:\Users\Admin\baeiw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1344
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD55c14d38b3d244c91e5c4387b95942cd4
SHA117a85bff2a300dc4356f292e1cb0c419e8a0d957
SHA256217b5d5dfb7acc65725decb8748f4571db2be11428e84205fd6317a7305800ef
SHA51240b9a3c179176da89a27e4b701fb40c81e66b83574e63ee253256dac7c6d15c5e9dc61f80b9744e1b4a4ea7aa18ff84eb58755907b890a5b4a191d473e46d64f