Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe
-
Size
200KB
-
MD5
be40213d6ee87e56872f458a357ad64b
-
SHA1
68af4666d7f076d4f5ab748f23789ac3fb55a168
-
SHA256
c4cfa50a039e5e07db30e7564f48aeb51ef36488a49f0a7b93390e6fd554e101
-
SHA512
41486856d5e038ed92bfb6319bb3931ca7572f619937c85755940d39338e0f170e404dd70071dcad21422ddd7403a9cc5af8457719313575dd8b32604b3baa5a
-
SSDEEP
1536:0KKgsa6RfSJ1tx1xnkxNy3tQ9CW5EZWHakMwP9W6uXN993ZNxtFnqlGcNskVatMG:5L6RfSJi0tQ9nLHbB9WF478dDVBm4uB0
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" biusue.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1812 biusue.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /w" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /c" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /l" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /e" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /j" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /t" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /y" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /p" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /k" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /q" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /z" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /h" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /r" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /o" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /x" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /u" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /i" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /m" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /v" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /f" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /d" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /r" be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /a" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /n" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /g" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /s" biusue.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biusue = "C:\\Users\\Admin\\biusue.exe /b" biusue.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biusue.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1752 be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe 1752 be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe 1812 biusue.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1752 be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe 1812 biusue.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1812 1752 be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe 90 PID 1752 wrote to memory of 1812 1752 be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe 90 PID 1752 wrote to memory of 1812 1752 be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be40213d6ee87e56872f458a357ad64b_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\biusue.exe"C:\Users\Admin\biusue.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1812
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD594cccc1e2a87e60678d9bec288c8d61c
SHA13242b7f11a4fb803b6021db310ffaebc4352b7e7
SHA2568aa842cf3b2990241d52622db8869f21420e10b2b85d40f47787df50a6fa5383
SHA51283b8f84ead5bf96eb4675df83f43861f61031cf0076d17e32b18f13d26a2ca08e7049bcc0314fe98b94d7f10ff6e8f52d1cf1148b6d350d851184e44c3c0f4a2