Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 08:44
Static task
static1
Behavioral task
behavioral1
Sample
12a1f645586560351aa02f44799e8f1f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12a1f645586560351aa02f44799e8f1f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
12a1f645586560351aa02f44799e8f1f_JaffaCakes118.exe
-
Size
260KB
-
MD5
12a1f645586560351aa02f44799e8f1f
-
SHA1
277aa7a899f7db5d98ff99dab7c37c54bdc589b6
-
SHA256
5834751d4d50e50d47566c6eee60b23b23b0108edc24a0e8552f653c587370d6
-
SHA512
0cca7646e2c9132648db4e8467a448cd1dc849fd8c9a61aa980fb787f0c7a049d1e625b2b5d2fc6a2c389dba16c401f00aaf5a8089ddb5fa36f28bb2c2d1c1ea
-
SSDEEP
6144:9doogTSrMaIl/jcLijfHFEHWzXvjT85R:9ytTSrMaIqLlI/H85R
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wcpoiw.exe -
Executes dropped EXE 1 IoCs
pid Process 2260 wcpoiw.exe -
Loads dropped DLL 2 IoCs
pid Process 1252 12a1f645586560351aa02f44799e8f1f_JaffaCakes118.exe 1252 12a1f645586560351aa02f44799e8f1f_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /g" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /v" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /B" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /X" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /H" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /L" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /F" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /M" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /h" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /U" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /o" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /t" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /O" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /D" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /C" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /k" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /K" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /j" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /a" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /G" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /l" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /r" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /P" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /n" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /V" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /p" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /u" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /q" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /Y" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /m" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /y" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /R" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /s" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /E" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /z" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /b" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /T" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /e" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /A" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /S" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /f" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /J" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /Q" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /x" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /w" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /i" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /c" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /N" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /W" wcpoiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcpoiw = "C:\\Users\\Admin\\wcpoiw.exe /Z" wcpoiw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12a1f645586560351aa02f44799e8f1f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcpoiw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe 2260 wcpoiw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1252 12a1f645586560351aa02f44799e8f1f_JaffaCakes118.exe 2260 wcpoiw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2260 1252 12a1f645586560351aa02f44799e8f1f_JaffaCakes118.exe 30 PID 1252 wrote to memory of 2260 1252 12a1f645586560351aa02f44799e8f1f_JaffaCakes118.exe 30 PID 1252 wrote to memory of 2260 1252 12a1f645586560351aa02f44799e8f1f_JaffaCakes118.exe 30 PID 1252 wrote to memory of 2260 1252 12a1f645586560351aa02f44799e8f1f_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\12a1f645586560351aa02f44799e8f1f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12a1f645586560351aa02f44799e8f1f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\wcpoiw.exe"C:\Users\Admin\wcpoiw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD596889c6bb6584dadd1bae4b6fd4a1d8c
SHA16adb8d48d9a9e9b86eec6ecb4094935c886d94fc
SHA2568e95c424c94b35be7677b3e9f45f9d67e00cb4905465203d3df032b4fbb0cd32
SHA5123a0cab7e9ef7ad7ab64f057d9fce1ca66f20cd08dee6c9488ac6ac0b8ab49849c9bdca5e7c17c6d774f5f7c16f43a0a48408837d79a071d1ef296e9ae5103c2f