Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe
-
Size
100KB
-
MD5
fe39a7fa93a37b91c97021031b360b64
-
SHA1
614ac18f5ea62e7b8c06b70cf56397d7a2b9e5c7
-
SHA256
c6e20bf19a6c61a39e2bb51bbde0f24aa42f11e2cff4441a4ec67abafc7822a4
-
SHA512
724ef9a53191f4657600afd265a86dc87d5dd26cf046196689328edaf09dc61a5d90c6af609d0cd887c11da048981315fa04d030e7d296e7550894609f930bec
-
SSDEEP
1536:Qqw8iAuismyWsdRw0wF9MGM9K/lKtNgCMbATbL3N+NM5EfbNIjP:kdtTLOM5sCP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jaofue.exe -
Executes dropped EXE 1 IoCs
pid Process 2840 jaofue.exe -
Loads dropped DLL 2 IoCs
pid Process 1880 fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe 1880 fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /Z" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /M" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /K" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /k" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /T" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /A" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /O" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /G" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /l" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /i" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /P" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /W" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /x" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /D" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /h" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /I" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /v" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /a" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /Y" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /r" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /S" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /H" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /X" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /W" fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /q" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /m" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /d" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /e" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /J" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /R" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /c" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /y" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /B" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /t" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /p" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /C" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /L" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /U" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /F" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /o" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /V" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /E" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /s" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /g" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /b" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /n" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /w" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /j" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /u" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /N" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /z" jaofue.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaofue = "C:\\Users\\Admin\\jaofue.exe /f" jaofue.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jaofue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1880 fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe 2840 jaofue.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1880 fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe 2840 jaofue.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1880 wrote to memory of 2840 1880 fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe 31 PID 1880 wrote to memory of 2840 1880 fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe 31 PID 1880 wrote to memory of 2840 1880 fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe 31 PID 1880 wrote to memory of 2840 1880 fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe39a7fa93a37b91c97021031b360b64_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\jaofue.exe"C:\Users\Admin\jaofue.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5fb76f7f92f83caa4452a4d95d8e16206
SHA1f920e02504e0373b6efae768210655e5076318df
SHA256bcd65540d8e3add454d82c9e4160960345e7790c61f2a2e6ba7e30cf1aa8f5cf
SHA512a7c263338aedcf0cd60998ed240b0d082af5f3a28e3d0ef12abc942e1b51050932a5c007f0152af29727f7512547092b9fe3118e9c957b419b0d91740879bd78