Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 20:23
Static task
static1
Behavioral task
behavioral1
Sample
538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe
-
Size
200KB
-
MD5
538dc278b2024fbcfa70d958da529b17
-
SHA1
75e8715eda770caf243fe81d02b7d2f39ad4a2a8
-
SHA256
eff8e68df8862cae43431d17826511daa3761241d3ee7575273ecca3a4388615
-
SHA512
06007240d6015bb6f7fb69f3c5ce96ebe87025d61c5c0a62ef5468aafb24322ced68eec8cb2b836a04b115e180a9947f7079f0ace84647c517aeb6a7d7192ea9
-
SSDEEP
3072:LCITo/0YxwN0tQ9nLHbB9WPliBs2HWWEakGJm9W:LCduN4QxL7B9WPli+yWWEazd
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yvweg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2680 yvweg.exe -
Loads dropped DLL 2 IoCs
pid Process 2748 538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe 2748 538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /r" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /n" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /o" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /e" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /u" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /i" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /f" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /j" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /x" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /l" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /i" 538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /d" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /q" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /g" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /c" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /y" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /w" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /a" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /h" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /b" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /p" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /m" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /t" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /k" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /v" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /z" yvweg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\yvweg = "C:\\Users\\Admin\\yvweg.exe /s" yvweg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yvweg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2748 538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe 2680 yvweg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2748 538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe 2680 yvweg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2680 2748 538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2680 2748 538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2680 2748 538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2680 2748 538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\538dc278b2024fbcfa70d958da529b17_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\yvweg.exe"C:\Users\Admin\yvweg.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD579b3ce529ed318d127eaabfa08de342c
SHA12efe99a94ebce569b5f40b336fec30f4085cc385
SHA256f8f4d18a604ab9a14b78c9ffd1e11c13b6fcbf7d714c3a88567b29999bcfbd4f
SHA512f96ef37facbe4236b71febc90aa94a098ebd46320deffacab4f190e6d4b70bdea3c0436464d29a0e9cf54c2e7bb6a9e31086d197007a89e8e919d4fc613bf27d