Analysis
-
max time kernel
150s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
173a9b8cd76d138d56af10ad5ec52a7d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
173a9b8cd76d138d56af10ad5ec52a7d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
173a9b8cd76d138d56af10ad5ec52a7d_JaffaCakes118.exe
-
Size
200KB
-
MD5
173a9b8cd76d138d56af10ad5ec52a7d
-
SHA1
e2f6a4653789157ecb4f451f97fad89dc8932d36
-
SHA256
024ce0d9b02535b04ff93baf11c958e6dafb460464b0cd5d28864090d1a2ed5d
-
SHA512
7ee1063a1f0d62713516e188ebddef0bc949a6677a88e8246169e93b0fbd5309926d10aff72314529b0a8fd71d534cd78c1cf7f22888b39ae46cb2aec00f8c76
-
SSDEEP
3072:RPeNC9Tstk/J3B1sZbxdaLCoDMT3ga/e1VK:ReNaTstk/JN2oDM7gG
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" voahes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 173a9b8cd76d138d56af10ad5ec52a7d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1516 voahes.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /R" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /i" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /o" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /n" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /b" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /h" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /Q" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /B" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /V" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /p" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /g" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /d" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /u" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /X" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /L" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /K" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /r" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /m" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /z" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /N" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /k" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /w" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /f" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /P" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /l" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /a" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /G" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /W" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /U" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /I" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /A" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /E" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /M" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /O" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /F" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /Y" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /D" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /c" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /T" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /t" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /q" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /e" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /v" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /C" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /J" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /H" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /y" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /S" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /x" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /j" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /s" voahes.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voahes = "C:\\Users\\Admin\\voahes.exe /Z" voahes.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 173a9b8cd76d138d56af10ad5ec52a7d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language voahes.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe 1516 voahes.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4540 173a9b8cd76d138d56af10ad5ec52a7d_JaffaCakes118.exe 1516 voahes.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4540 wrote to memory of 1516 4540 173a9b8cd76d138d56af10ad5ec52a7d_JaffaCakes118.exe 82 PID 4540 wrote to memory of 1516 4540 173a9b8cd76d138d56af10ad5ec52a7d_JaffaCakes118.exe 82 PID 4540 wrote to memory of 1516 4540 173a9b8cd76d138d56af10ad5ec52a7d_JaffaCakes118.exe 82 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81 PID 1516 wrote to memory of 4540 1516 voahes.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\173a9b8cd76d138d56af10ad5ec52a7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\173a9b8cd76d138d56af10ad5ec52a7d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\voahes.exe"C:\Users\Admin\voahes.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD532711625f23c6ec30e16039f697bfe4e
SHA1ff633f758e245f7fd99947104f26004a5594316e
SHA256fd78e4c874e46938998812ef2971a2a5dba08b4988590be8994950d2cf750581
SHA51295a7d6b4a3c26a33b592d2466d2f35f256df34f95232845cecfeaccc7342f509e6afea5b1b27b34b685b2ff145bb1af19f357c29f8dccad8331b702a784790bd