Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe
-
Size
364KB
-
MD5
ea8ab6f41703604e1ada3505ab4c6788
-
SHA1
b636595ba89bf599eec6c7cca42656f10ad5a8e0
-
SHA256
65776792b9a2c5c2c8cf0cedc1e396b7df60f2766c9605c5cc1e336933ea25ba
-
SHA512
b5394cd4bd1c687c925da3bd89d2fe4be04fa1698ea76a4f17fe78ffe9fc1dbdf94e1d8e03747fc8b32c8aba1b1c22f9822c10f27e0f58ae374626312a4de3a6
-
SSDEEP
3072:qBGAiXP9eJuGEnvBEPHplTOoX56B4uE7U4iy+LwldhzNkYMvMZqvRHJH7T6toRGm:b9cuPnvBEvxYJxwphkYMvMZBDOb
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sooipam.exe -
Executes dropped EXE 1 IoCs
pid Process 2940 sooipam.exe -
Loads dropped DLL 2 IoCs
pid Process 2388 ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe 2388 ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /c" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /s" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /x" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /u" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /q" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /b" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /o" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /z" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /d" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /n" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /i" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /r" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /w" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /l" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /a" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /h" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /a" ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /j" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /p" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /t" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /g" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /v" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /k" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /m" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /f" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /e" sooipam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sooipam = "C:\\Users\\Admin\\sooipam.exe /y" sooipam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sooipam.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2388 ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe 2940 sooipam.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2388 ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe 2940 sooipam.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2940 2388 ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2940 2388 ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2940 2388 ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2940 2388 ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea8ab6f41703604e1ada3505ab4c6788_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\sooipam.exe"C:\Users\Admin\sooipam.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD5dfcb9b5791e46389bdd53e85d34209dd
SHA1ada26472ec5e3c7ad5ec349106fb42e4e98e26b4
SHA256e826cf84f143d4ad8c90a7892d05796232c3436884ee4141285e4432e014ce2e
SHA5129ed87f77f5bff77352ced4ec915f2f78fd950f218830dcde20bbb3371fddb7273afec6e316e3e036008b7c50e8a2fb05b53eba2c8fec62529181eeb92aa6f501