Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 17:05
Static task
static1
Behavioral task
behavioral1
Sample
bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe
-
Size
232KB
-
MD5
bc96d63d180bfe3b7a482035b4affe43
-
SHA1
59793ae77be53e7ac66eb0444d66727f5ddb1130
-
SHA256
22152b5a501e1a65a0c7d4889d62f8691321ced2978fd26a517fe290574e7e4d
-
SHA512
6ee6383949a371dd325b30675f493a9d05daed2a74582d68318935d1df158ef5b245ea700e9b0ba3f90ba39c6709982b6625693cfd5dbe0e664da4f20c29112e
-
SSDEEP
6144:mFZE3PFKs7GeF+c9EqxF6snji81RUinKg:hPhY
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" luzom.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3964 luzom.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /a" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /f" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /w" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /b" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /s" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /e" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /q" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /p" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /h" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /z" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /l" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /x" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /o" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /n" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /y" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /r" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /m" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /u" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /t" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /i" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /g" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /k" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /c" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /v" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /k" bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /j" luzom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luzom = "C:\\Users\\Admin\\luzom.exe /d" luzom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luzom.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3528 bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe 3528 bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe 3964 luzom.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3528 bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe 3964 luzom.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3528 wrote to memory of 3964 3528 bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe 95 PID 3528 wrote to memory of 3964 3528 bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe 95 PID 3528 wrote to memory of 3964 3528 bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc96d63d180bfe3b7a482035b4affe43_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\luzom.exe"C:\Users\Admin\luzom.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3964
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD57906a63902df449760b6499a5fe4a260
SHA1ad27ec9b0a6439bc9c14d752fe36bc8ae32aa4aa
SHA25604aae8d2e9685eb51716adba90bbdc501fd2cfe009234fab918aac5f375ad8a7
SHA512e35fce30ef3a0fd512b3e4faec4701a5611fc1c26e3ca6f3089058ec2e9dd1b70a77af97d834e3ee7e34a0d24c6b17f4e731a14306fd809820a7f49c000ab6aa