Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 17:23
Static task
static1
Behavioral task
behavioral1
Sample
0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe
-
Size
96KB
-
MD5
0275c263caadd3079900c58aae60fd7b
-
SHA1
28866f2cd1432c3a11fc2a146240941b09541f61
-
SHA256
d7641d91f88eb4707e80cf376d5a4c01bcdc384a2d37d4fe869aaeb3b25406a4
-
SHA512
9e21a911510bd8542d7d83a7de8b8ce758caeb351763aca73f2f3a8eabdbcbd0e8229a48e7bc68a81a1a9b256732bd87d9af036067200c5fed3fac9f848d0ec9
-
SSDEEP
1536:f9oEg52N9tyVQO8P8ychdGwjj3RJNEo/knRzdnynE7RldNEP8lijOe/NIjP:feE/NelychdvzR3Ek65Rldq/CP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xeavui.exe -
Executes dropped EXE 1 IoCs
pid Process 836 xeavui.exe -
Loads dropped DLL 2 IoCs
pid Process 2516 0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe 2516 0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /V" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /M" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /f" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /x" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /I" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /Y" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /v" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /L" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /T" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /j" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /w" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /y" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /F" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /n" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /W" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /m" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /z" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /D" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /S" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /R" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /s" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /d" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /N" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /b" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /A" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /i" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /G" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /Q" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /r" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /O" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /g" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /p" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /K" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /e" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /h" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /P" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /Z" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /B" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /k" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /J" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /U" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /c" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /C" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /o" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /H" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /u" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /E" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /l" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /a" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /X" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /q" xeavui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeavui = "C:\\Users\\Admin\\xeavui.exe /X" 0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeavui.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2516 0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe 836 xeavui.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2516 0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe 836 xeavui.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 836 2516 0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe 30 PID 2516 wrote to memory of 836 2516 0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe 30 PID 2516 wrote to memory of 836 2516 0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe 30 PID 2516 wrote to memory of 836 2516 0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0275c263caadd3079900c58aae60fd7b_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\xeavui.exe"C:\Users\Admin\xeavui.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:836
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c078cb762e01f16003ea7e5fe7e59438
SHA190c5d224377b3f63c9cf52c17ec59d6191fc1754
SHA25627e876e3bdefc328736214b0750fc65bb9a51ea41baeb5a63ae4066f63130fe3
SHA512383e9393e13f30fbea8f1b35137c383a6d427877a57e2abfcca9cd0c251d4d68d4fed9435f685b5be44f70849887a9585f4da6b0552a9ff81993962a7171c5d3