Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2025, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe
-
Size
251KB
-
MD5
ee3b5472af95b20e0bd143ac09e8413f
-
SHA1
ddfadbafc764c5fca1061afc8f510ec79fce5867
-
SHA256
4a6cc24d3fc5162bd0892f6a15126f7c801f8e5631a8100901ff1b735dae5c6f
-
SHA512
253993cdab6a79e4b3aac98b8ac7879ed188368514aa7a103a82cac3b971968a2f121aa094826a6e28908173113df1884f85523004e03da467d3b32c3fde4bdd
-
SSDEEP
3072:x3tpH5vx16ClhTNAycOUXJ9lwLpTlW6hXWLLFpIB1HlrWVKW5J7f3e:x3rPltNAlOUXJ9lwLpFALPmhW0W372
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
classyu4
Signatures
-
Hawkeye family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation audiodgi.exe Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdate.exe wmpmetwk.exe File opened for modification C:\users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdate.exe wmpmetwk.exe -
Executes dropped EXE 5 IoCs
pid Process 928 Windows Update.exe 2288 audiodgi.exe 3488 Windows Update.exe 1840 wmpmetwk.exe 2084 wmpmetwk.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audiodgi.exe" audiodgi.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5012 set thread context of 3480 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 89 PID 928 set thread context of 3488 928 Windows Update.exe 92 PID 1840 set thread context of 2084 1840 wmpmetwk.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1708 3488 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiodgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpmetwk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpmetwk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Update.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 428 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 2288 audiodgi.exe 928 Windows Update.exe 1840 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe 1840 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe 1840 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe 1840 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe 1840 wmpmetwk.exe 2084 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe 1840 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe 1840 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe 1840 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe 1840 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe 1840 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe 1840 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe 1840 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe 1840 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe 1840 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe 1840 wmpmetwk.exe 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 928 Windows Update.exe 2288 audiodgi.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe Token: SeDebugPrivilege 2288 audiodgi.exe Token: SeDebugPrivilege 928 Windows Update.exe Token: SeDebugPrivilege 1840 wmpmetwk.exe Token: SeDebugPrivilege 2084 wmpmetwk.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2084 wmpmetwk.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5012 wrote to memory of 3480 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 89 PID 5012 wrote to memory of 3480 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 89 PID 5012 wrote to memory of 3480 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 89 PID 5012 wrote to memory of 3480 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 89 PID 5012 wrote to memory of 3480 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 89 PID 5012 wrote to memory of 3480 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 89 PID 5012 wrote to memory of 3480 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 89 PID 5012 wrote to memory of 3480 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 89 PID 3480 wrote to memory of 928 3480 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 90 PID 3480 wrote to memory of 928 3480 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 90 PID 3480 wrote to memory of 928 3480 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 90 PID 5012 wrote to memory of 2288 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 91 PID 5012 wrote to memory of 2288 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 91 PID 5012 wrote to memory of 2288 5012 JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe 91 PID 928 wrote to memory of 3488 928 Windows Update.exe 92 PID 928 wrote to memory of 3488 928 Windows Update.exe 92 PID 928 wrote to memory of 3488 928 Windows Update.exe 92 PID 928 wrote to memory of 3488 928 Windows Update.exe 92 PID 2288 wrote to memory of 1840 2288 audiodgi.exe 96 PID 2288 wrote to memory of 1840 2288 audiodgi.exe 96 PID 2288 wrote to memory of 1840 2288 audiodgi.exe 96 PID 1840 wrote to memory of 2084 1840 wmpmetwk.exe 97 PID 1840 wrote to memory of 2084 1840 wmpmetwk.exe 97 PID 1840 wrote to memory of 2084 1840 wmpmetwk.exe 97 PID 1840 wrote to memory of 2084 1840 wmpmetwk.exe 97 PID 1840 wrote to memory of 2084 1840 wmpmetwk.exe 97 PID 1840 wrote to memory of 2084 1840 wmpmetwk.exe 97 PID 1840 wrote to memory of 2084 1840 wmpmetwk.exe 97 PID 1840 wrote to memory of 2084 1840 wmpmetwk.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"4⤵
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 805⤵
- Program crash
PID:1708
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe"C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe"C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exeC:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe4⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2084
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3488 -ip 34881⤵PID:3512
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDcxNzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTY4MDM3MTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjgwMjA2MTc0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:428
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD5a44f695672f0da8ff069e7f531e40278
SHA17a194c99d3f1826af2ef8cff3d00d9c6c8dc3c8c
SHA256598d6f030bc64907a18c741cec7d49cbc7df226b3aaad4c25223306457d5e13e
SHA5126c80de3f30f69acfa611c7ec05dd8f373083901f7b3b68438ddc18613463cf12503cf50fffaa742694b46e483ba43b924c8e7fde4bb5a5257d9294201e2be72a
-
Filesize
8KB
MD513da1958462e33bd431ed429fbf0da06
SHA190699d7b1e43c53b3ed31acc19f3daf758bd4262
SHA2569fd3a80e2e961f13a35d5637d2401b914d41a32662135c1fded655c73d5b1264
SHA51284403df4cd56cdae97372b2b63201713d000588c2a7d135eabf65bd85ef70b0b70f30bd30742b0fe0aa0e30fbca1df95755c4c64e24599269b277d7bde9e7263
-
Filesize
251KB
MD5ee3b5472af95b20e0bd143ac09e8413f
SHA1ddfadbafc764c5fca1061afc8f510ec79fce5867
SHA2564a6cc24d3fc5162bd0892f6a15126f7c801f8e5631a8100901ff1b735dae5c6f
SHA512253993cdab6a79e4b3aac98b8ac7879ed188368514aa7a103a82cac3b971968a2f121aa094826a6e28908173113df1884f85523004e03da467d3b32c3fde4bdd