Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe
-
Size
100KB
-
MD5
d4aaa92803f68fef24795b7142d06eb4
-
SHA1
e11ce01563acbb49b7ee8c5c957649d0bae66d0f
-
SHA256
215affd70a67a05c8f7211099490f42b3a7aeb82e6184d69f218a59cda7341b7
-
SHA512
8da09b6618ebec66c38b82de733c5c3b47cd61142bcb3b3931a9f2e3f77a37c6d8043be1b15e2565db853f25851933a84ed2128b118b9157d57ad31e13855121
-
SSDEEP
1536:33tGK82NTzwciMGAc4ohrPXo+73Rez8b0Sy2NIjnZMd:NwclurPX7C2Cned
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" beugoiw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 beugoiw.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /o" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /e" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /R" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /Y" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /j" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /X" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /D" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /H" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /A" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /M" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /v" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /L" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /Q" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /F" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /s" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /G" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /w" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /O" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /E" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /I" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /f" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /g" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /r" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /J" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /S" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /B" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /n" d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /z" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /d" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /T" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /Z" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /k" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /U" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /l" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /q" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /y" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /C" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /m" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /c" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /p" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /t" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /P" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /W" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /a" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /u" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /V" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /h" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /b" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /K" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /x" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /i" beugoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beugoiw = "C:\\Users\\Admin\\beugoiw.exe /N" beugoiw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beugoiw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3460 d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe 3460 d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe 3008 beugoiw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3460 d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe 3008 beugoiw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3460 wrote to memory of 3008 3460 d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe 91 PID 3460 wrote to memory of 3008 3460 d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe 91 PID 3460 wrote to memory of 3008 3460 d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4aaa92803f68fef24795b7142d06eb4_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\beugoiw.exe"C:\Users\Admin\beugoiw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5b37d489f52d38ca325d0fa0393eb8066
SHA1551f63b8122e08c66929c3df431a0caa5402f403
SHA2568b21a88ecbb13bffb43895ceebfe156bfc24fd436839e44840668ce3e112f94e
SHA5122a4bef2447d83a80e7696f911b5d10e36793acb95391108653e18b84ffcb7ef689bd98dc5c154ca08d595a115b253404928950575e24e6306dc10de06ea35aa7