Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe
-
Size
332KB
-
MD5
08387ae5b5b436b052a740e4969ca0cd
-
SHA1
9616512e0d42688ea94fd362efb37d4cf528c34b
-
SHA256
bcb147e778426b6986e5b09f521ffbb959aac05acff1146dab39d6e63be1f29f
-
SHA512
c11cf72e09cb904f6938a51504e95edd3d0394e26bf8690c40d7e1b7e4c0850e27435cfc89a0c6e94e136dded148350cef7ac6cf2c334588ae20164b75ef8d74
-
SSDEEP
3072:RnkRQSlgkBfrvZk1jrLXvYNJOLlDrDxUfSGIf9b6L6VlMixFGI5FpqMBDzsUiztK:WQYZr8rLXeaHDxUadt382FxYIcUutK
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tiegai.exe -
Executes dropped EXE 1 IoCs
pid Process 1684 tiegai.exe -
Loads dropped DLL 2 IoCs
pid Process 1724 08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe 1724 08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /Z" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /e" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /j" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /V" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /D" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /J" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /l" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /O" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /C" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /U" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /L" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /a" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /k" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /R" 08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /g" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /X" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /x" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /u" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /Q" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /E" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /z" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /F" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /G" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /r" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /H" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /Y" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /B" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /S" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /h" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /f" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /c" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /W" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /b" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /T" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /y" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /q" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /p" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /t" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /v" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /n" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /K" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /P" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /M" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /m" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /s" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /I" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /i" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /d" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /w" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /A" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /o" tiegai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiegai = "C:\\Users\\Admin\\tiegai.exe /R" tiegai.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tiegai.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1724 08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe 1684 tiegai.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1724 08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe 1684 tiegai.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1684 1724 08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe 30 PID 1724 wrote to memory of 1684 1724 08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe 30 PID 1724 wrote to memory of 1684 1724 08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe 30 PID 1724 wrote to memory of 1684 1724 08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08387ae5b5b436b052a740e4969ca0cd_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\tiegai.exe"C:\Users\Admin\tiegai.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1684
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD5126b4ef4caca1fb9f024a83b0d0ca190
SHA17f54dd1150db14424e6a44a0717a82ee0a6f7690
SHA2565ea634a7d936d638991af5bd1dc8a5c65fc0f8dbf82b40d8bdc361dca2061912
SHA51210fef1bd4b14093f8c1d9050573bffa7793edd9d881b570669f24b56a5d17bd7b88e5f620ffcc267213420b622bfae58b0ce8870bb2b1812e8c4ed5879f36aa6