Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe
-
Size
152KB
-
MD5
f06e9f56b1a4c0e83eb0860274cb6624
-
SHA1
cb73e39226e9fa7465dd46de30ab11ab2146dc99
-
SHA256
f742a8de7ae980186caa7a955a3a6e00e2074f1ca6036b0de4d24f58ab6fd08d
-
SHA512
fa54d9b758da2c0f4ccb8b4f096b25820873e1ccf943a6dc8e003df5f35b43a4f532547461c6fd71493563cb0f53fdc4a355673ad137b946c1f55f91ffd1b592
-
SSDEEP
3072:8MGiPYYh0ZXr+7DxNUbaxIcz93bOButK+ZAok:Mr+7DxVh3bHp1k
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mouze.exe -
Executes dropped EXE 1 IoCs
pid Process 2704 mouze.exe -
Loads dropped DLL 2 IoCs
pid Process 2324 f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe 2324 f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /Z" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /F" f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /R" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /W" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /T" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /g" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /o" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /H" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /p" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /z" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /m" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /e" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /c" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /k" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /D" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /N" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /C" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /G" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /U" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /x" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /v" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /a" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /j" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /E" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /J" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /S" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /r" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /M" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /t" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /O" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /w" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /b" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /Y" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /u" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /h" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /P" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /F" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /A" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /d" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /s" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /X" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /K" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /Q" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /V" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /q" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /n" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /I" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /l" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /L" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /B" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /i" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /y" mouze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouze = "C:\\Users\\Admin\\mouze.exe /f" mouze.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mouze.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2324 f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe 2704 mouze.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2324 f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe 2704 mouze.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2704 2324 f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe 30 PID 2324 wrote to memory of 2704 2324 f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe 30 PID 2324 wrote to memory of 2704 2324 f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe 30 PID 2324 wrote to memory of 2704 2324 f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f06e9f56b1a4c0e83eb0860274cb6624_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\mouze.exe"C:\Users\Admin\mouze.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5e6031fb565f8ab99741693682e9abd09
SHA193ed7ebbe025d7dc9fd31705b6e663574b103772
SHA2566ed8f3f900948ddd242e7c9e291b38c5fd08866e3c26ec18d7082af10eb4d21e
SHA51212f7c7f153424b1d4df0795805d49c485ba9400822d34cf54a98bd4705c53518777be6944d7407e7d94740262a41c9c88d0e3856cdc7cf579139ff4d038bf8d0