Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 15:05
Static task
static1
Behavioral task
behavioral1
Sample
bc3befb2f1d040d5cdf832bd1fdea92d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bc3befb2f1d040d5cdf832bd1fdea92d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc3befb2f1d040d5cdf832bd1fdea92d_JaffaCakes118.exe
-
Size
80KB
-
MD5
bc3befb2f1d040d5cdf832bd1fdea92d
-
SHA1
ba206f845c2386cf931d7b83003847ecdf607fac
-
SHA256
02f3a65431c6223ceac8ad0a18cce41a976e572b1a1817eb8b39c7fe95a53be4
-
SHA512
119b12e0a6f792eece79ae2d1347ecf9ab822c99615e7cd47ce5e9fa6e062e192c7c1068860877cf6237ce192b3a538ad4d702087c9a81d60b9c7791801973ac
-
SSDEEP
768:ev6nMfqH++4qZHcAc8ebdtF5EmpW/p/hxRSH9NxIkL9v/Q6sWD:ev6Mq92ZKmpSFhxRSHdL9bsS
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cuiwii.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation bc3befb2f1d040d5cdf832bd1fdea92d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2580 cuiwii.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuiwii = "C:\\Users\\Admin\\cuiwii.exe" cuiwii.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2676 1424 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc3befb2f1d040d5cdf832bd1fdea92d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cuiwii.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe 2580 cuiwii.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1424 bc3befb2f1d040d5cdf832bd1fdea92d_JaffaCakes118.exe 2580 cuiwii.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2580 1424 bc3befb2f1d040d5cdf832bd1fdea92d_JaffaCakes118.exe 88 PID 1424 wrote to memory of 2580 1424 bc3befb2f1d040d5cdf832bd1fdea92d_JaffaCakes118.exe 88 PID 1424 wrote to memory of 2580 1424 bc3befb2f1d040d5cdf832bd1fdea92d_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc3befb2f1d040d5cdf832bd1fdea92d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc3befb2f1d040d5cdf832bd1fdea92d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\cuiwii.exe"C:\Users\Admin\cuiwii.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 14762⤵
- Program crash
PID:2676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1424 -ip 14241⤵PID:4896
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5b24aba8834b858cd0b5cb02c409e7c61
SHA16574723dad6fe5e380ef4248ca459c988b7101f9
SHA25606168a135156e0551e2b16f108f494f1913f4b9a790487adc0888842937d1b33
SHA51253ada6295113a9efd5f9f368d18b3e313edd10776740fa76ace8b86133dcefcaaa4904b28f3f5dc28d22a73d6717d58f5e80fd261641a7f3eb7963bdfe796a6a