Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 20:16
Static task
static1
Behavioral task
behavioral1
Sample
ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe
-
Size
332KB
-
MD5
ee59735d0b5a73d51cdce9abe2274594
-
SHA1
9120871846b8b2aeb3f912253206d92b3f125d14
-
SHA256
a0498b41c74a4fa8e6d05f3bde895ecb107873c3a975080d7fa55885e8e16011
-
SHA512
8af2382d7ebbb7258c3de9e4a6bff040ddaebc79afb3615fc9c4709f83dbccace53e851856c7cdb0edcf5c09008be881533bd89e3678999caa9fa2ebbc0e424a
-
SSDEEP
6144:TTepYGCleWHLNAnJHms8aBDR12SgqDxYWc:TadNnFV12VqDq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" geozaa.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 5024 geozaa.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /L" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /N" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /H" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /K" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /d" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /T" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /I" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /J" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /B" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /l" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /S" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /V" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /k" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /O" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /Q" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /e" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /x" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /U" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /M" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /r" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /z" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /s" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /o" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /v" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /a" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /Y" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /A" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /y" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /q" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /R" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /Z" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /b" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /F" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /w" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /t" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /p" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /n" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /f" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /C" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /m" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /G" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /j" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /E" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /P" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /i" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /g" ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /h" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /D" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /u" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /c" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /W" geozaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geozaa = "C:\\Users\\Admin\\geozaa.exe /X" geozaa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geozaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2292 ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe 2292 ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe 5024 geozaa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2292 ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe 5024 geozaa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2292 wrote to memory of 5024 2292 ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe 86 PID 2292 wrote to memory of 5024 2292 ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe 86 PID 2292 wrote to memory of 5024 2292 ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee59735d0b5a73d51cdce9abe2274594_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\geozaa.exe"C:\Users\Admin\geozaa.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5024
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD5434402ca0428b99dbf3d3bfe663ed5d1
SHA15b7298b0b0e604c92b085bd6c71911d6985190bc
SHA256d1286b4d732ae25acbc7949f9d6599a021e9ecfc6f203d58cc4ee357086b08aa
SHA512ad8fd08ff90ac1e355c0a95556924122d7c77c5b1c5b288c0089296f22b0e9195b801ec98c2f8d93125e3bae6bdfaf627a2e90d6a2c336d219b35cde34a1e7f7