Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 13:16
Static task
static1
Behavioral task
behavioral1
Sample
0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe
-
Size
204KB
-
MD5
0ad6eebf5e0b64b0442c40d85d5be69d
-
SHA1
afcf1d07f4af11f14669f4b0959490d58010613d
-
SHA256
a2d6467a8f3d619a18fcae54b0aaae999680258dd8f1c28b00e3c8fbf2b1f5d4
-
SHA512
e5e51ad921a830b219da0fcb4e093ca6ec7b6f21b3fa56b7e6b42db005e454eab4372c2cc35b81893374e72e084defeaee5748233422280d5f8c31fa808d6d06
-
SSDEEP
3072:xN360tQ9nLHbB9W+U1TqEYzR/mkSYGrl9ymgYUWup:xh64QxL7B9W+U1RYzR/fSmlh
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" seuanez.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4124 seuanez.exe -
Adds Run key to start application 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /d" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /u" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /k" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /c" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /m" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /z" 0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /p" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /v" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /l" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /a" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /j" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /y" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /t" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /i" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /h" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /w" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /b" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /z" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /q" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /e" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /g" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /x" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /o" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /s" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /r" seuanez.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seuanez = "C:\\Users\\Admin\\seuanez.exe /f" seuanez.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seuanez.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3908 0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe 3908 0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe 4124 seuanez.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3908 0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe 4124 seuanez.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3908 wrote to memory of 4124 3908 0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe 82 PID 3908 wrote to memory of 4124 3908 0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe 82 PID 3908 wrote to memory of 4124 3908 0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ad6eebf5e0b64b0442c40d85d5be69d_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\seuanez.exe"C:\Users\Admin\seuanez.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4124
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5970db09c17e67340009f5f9978cfa8e0
SHA1d0ab56b96bf0af1e8a2a22707b47d46235cb93af
SHA256bfbea0f64ed10c297a2e8dafb336c07a94ea997e720ed5324d879c2a11902151
SHA5121e592998e7866b0beebd5acff9747049e9de72c1bf90aca4c3beb11fcb4df4ae542e4069214888b4e0a42557f694ad3572798bd382ae05714432b777e4b76cc1