Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
b7f9ef8d9e36b6138b0db49e261cd17a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b7f9ef8d9e36b6138b0db49e261cd17a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7f9ef8d9e36b6138b0db49e261cd17a_JaffaCakes118.exe
-
Size
216KB
-
MD5
b7f9ef8d9e36b6138b0db49e261cd17a
-
SHA1
4b1f3cb5bb487902a601b2fa57c5f6ad7645515a
-
SHA256
4f76c604d99cd0887865ede510b6711a0f540249c15f8399aae2851c840e5ff4
-
SHA512
89d9c6bf246f45d79883d4f466a835a1b57a42dd05b9dd90ab5effa696b56f71431aceddc96dae6540bb2212be8990e775db15c95c4f1a086e04fbf5ac7e436c
-
SSDEEP
6144:f4duoDdJzpTlbwEhYKFIGuhtFaA6Tuyrj:fWxFJ+IIGusduy
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" heoxiu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation b7f9ef8d9e36b6138b0db49e261cd17a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 116 heoxiu.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /s" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /i" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /J" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /Q" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /g" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /x" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /O" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /u" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /a" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /d" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /W" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /D" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /G" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /m" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /A" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /v" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /R" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /H" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /F" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /h" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /Y" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /L" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /I" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /e" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /K" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /n" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /N" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /w" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /c" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /P" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /C" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /T" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /M" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /S" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /Z" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /z" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /B" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /k" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /p" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /l" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /j" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /q" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /b" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /o" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /r" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /f" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /t" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /X" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /V" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /U" heoxiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heoxiu = "C:\\Users\\Admin\\heoxiu.exe /y" heoxiu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7f9ef8d9e36b6138b0db49e261cd17a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language heoxiu.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe 116 heoxiu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1848 b7f9ef8d9e36b6138b0db49e261cd17a_JaffaCakes118.exe 116 heoxiu.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1848 wrote to memory of 116 1848 b7f9ef8d9e36b6138b0db49e261cd17a_JaffaCakes118.exe 89 PID 1848 wrote to memory of 116 1848 b7f9ef8d9e36b6138b0db49e261cd17a_JaffaCakes118.exe 89 PID 1848 wrote to memory of 116 1848 b7f9ef8d9e36b6138b0db49e261cd17a_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7f9ef8d9e36b6138b0db49e261cd17a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7f9ef8d9e36b6138b0db49e261cd17a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\heoxiu.exe"C:\Users\Admin\heoxiu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:116
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD51a21c94041dd5c8476005e30c1c4ccb3
SHA10434b89f638c3f97d3b45bfc5116b79ad7db0422
SHA2567c8160995df17b8ed607cd30d61b743f11c9f7ec071f770dd5a557ea9f221f8b
SHA5127f6d3860c7b861c8ffe823c512173a2300b36f80a2d7e4cbcedbc8c15b179e9be11521c075e70d2566f35c30823fca75e4f15cf41eff0ff4809aa04d656b82a3