Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 15:32
Static task
static1
Behavioral task
behavioral1
Sample
de707053d58babaf5eb9c7115154612d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de707053d58babaf5eb9c7115154612d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de707053d58babaf5eb9c7115154612d_JaffaCakes118.exe
-
Size
244KB
-
MD5
de707053d58babaf5eb9c7115154612d
-
SHA1
3c020980e48994ed859c0dc5084d7b6979ff64c1
-
SHA256
2deb6f6e116c990886cd374790714ac8300d9c48c7ca8ddca3c965b7799d4216
-
SHA512
a3b5a6f209df562297c91799716371b202e1c2915f2a947338439bc2cc80a301e483db44824f06ffd24d27c068ae8c8d3093458f7fee100cfa93ac1039930635
-
SSDEEP
768:1lvMaHfJcwaMCJUwbjMPkG1VuW/wqvRXMXp677yCzdXZRT2Nq1MaQnepMri14PGe:1Rl/JcsKJlGVs4emEFbcP0
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kaamiy.exe -
Executes dropped EXE 1 IoCs
pid Process 2480 kaamiy.exe -
Loads dropped DLL 2 IoCs
pid Process 1660 de707053d58babaf5eb9c7115154612d_JaffaCakes118.exe 1660 de707053d58babaf5eb9c7115154612d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 49 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /D" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /F" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /S" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /p" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /q" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /u" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /w" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /r" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /s" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /T" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /B" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /P" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /k" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /g" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /V" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /b" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /a" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /O" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /Y" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /E" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /h" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /C" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /I" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /U" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /K" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /o" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /L" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /A" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /d" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /m" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /J" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /z" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /M" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /y" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /j" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /H" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /t" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /R" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /X" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /W" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /f" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /e" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /G" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /n" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /c" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /N" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /x" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /Q" kaamiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaamiy = "C:\\Users\\Admin\\kaamiy.exe /Z" kaamiy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de707053d58babaf5eb9c7115154612d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kaamiy.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe 2480 kaamiy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1660 de707053d58babaf5eb9c7115154612d_JaffaCakes118.exe 2480 kaamiy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2480 1660 de707053d58babaf5eb9c7115154612d_JaffaCakes118.exe 31 PID 1660 wrote to memory of 2480 1660 de707053d58babaf5eb9c7115154612d_JaffaCakes118.exe 31 PID 1660 wrote to memory of 2480 1660 de707053d58babaf5eb9c7115154612d_JaffaCakes118.exe 31 PID 1660 wrote to memory of 2480 1660 de707053d58babaf5eb9c7115154612d_JaffaCakes118.exe 31 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30 PID 2480 wrote to memory of 1660 2480 kaamiy.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\de707053d58babaf5eb9c7115154612d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de707053d58babaf5eb9c7115154612d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\kaamiy.exe"C:\Users\Admin\kaamiy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5eec1b9b2f7a2248bc96d2805be0e35f3
SHA1731d92e6ca80037600c766fddceee9f4937ced6e
SHA256ff138b76a4ae62ae859a906fae0fdf9d4a96609e132814020582fd65edc48fd9
SHA5121ce97d38a1cb6710a1751759c80d1f8129e287dec5f2e276eb1fab2458d1422ea1c5acea1f138ab509bd8256aabdf450146c185f7c6760652647d95263034977