Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
ee600aec3c72adb061ea2ec2c30188f2_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ee600aec3c72adb061ea2ec2c30188f2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee600aec3c72adb061ea2ec2c30188f2_JaffaCakes118.exe
-
Size
220KB
-
MD5
ee600aec3c72adb061ea2ec2c30188f2
-
SHA1
891427baaa78b914589c35e3c2abdf60e20e00c0
-
SHA256
743227b77a0473add92caffc3a3ed7dc94f3a24ed322b9a1d34c23bed7807e6b
-
SHA512
9209c3b29c3415a38d4e8fd236708ff46de6c65f4b1f32404c274416a992c18d5b88323a77eb72d257cc1a0faf2eed69063ed33c5dc2852a95c85b1dd3afa9cc
-
SSDEEP
6144:oXyGJkoETYHg5mMR8dogDtFzTf2rEfeeScKpBagLVwkM8g3Ip4zuMY0ju9pgpGw:y6dTYH+NK2+zHeYGlJpBaMfM8g3Nu9pR
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" seeorug.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation ee600aec3c72adb061ea2ec2c30188f2_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1264 seeorug.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /s" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /X" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /A" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /L" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /b" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /H" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /J" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /D" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /K" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /a" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /N" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /R" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /S" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /C" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /G" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /g" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /E" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /t" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /l" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /P" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /B" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /O" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /m" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /Z" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /U" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /z" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /u" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /T" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /w" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /V" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /F" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /h" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /d" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /W" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /f" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /y" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /r" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /j" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /k" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /c" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /q" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /p" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /x" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /v" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /M" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /i" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /I" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /Q" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /o" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /e" seeorug.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seeorug = "C:\\Users\\Admin\\seeorug.exe /n" seeorug.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee600aec3c72adb061ea2ec2c30188f2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seeorug.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe 1264 seeorug.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1228 ee600aec3c72adb061ea2ec2c30188f2_JaffaCakes118.exe 1264 seeorug.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1264 1228 ee600aec3c72adb061ea2ec2c30188f2_JaffaCakes118.exe 86 PID 1228 wrote to memory of 1264 1228 ee600aec3c72adb061ea2ec2c30188f2_JaffaCakes118.exe 86 PID 1228 wrote to memory of 1264 1228 ee600aec3c72adb061ea2ec2c30188f2_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee600aec3c72adb061ea2ec2c30188f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee600aec3c72adb061ea2ec2c30188f2_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\seeorug.exe"C:\Users\Admin\seeorug.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1264
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD598c23200fbff92c21434136c5613757e
SHA1dae968cca5abd64f089aa893ad150671be448ebd
SHA256e9955677180aab3a380953314db9a8f82be66d960b6c1cf301601d52c293ae13
SHA51297b55cd1d338c1d04dbf5a97089c756080a19232c3e3e296c93d55f8f10c758be3c1bac48037b9528c073365f9c85e2e467dc5a7197485fb083668b6c9259133