Analysis
-
max time kernel
21s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe
-
Size
80KB
-
MD5
8a8b6168b4618452923d207145ce05fe
-
SHA1
85df3268dad82c4e7355c05b87324e56107d2cc6
-
SHA256
2f4aa35003418807ea4d8fcdbea11259a879e07960ac778a59c66cb37907e92b
-
SHA512
2b2089a9eb23f6b72632d5e7434266cddeed7ea4fd0851ee9bb8e2fdcfface1cee11f16376e269d67c62b27e9d6302aaf6c534d8acc3acd55769cfe67dc49d62
-
SSDEEP
1536:EsPdg+Y16Lti8n42APNR2dcScLcPcxeTanuUHWOls3xxNMq39gk34iS6G:qM4PNEdcScLcPcfnuH0yG
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" peehioc.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 peehioc.exe -
Loads dropped DLL 2 IoCs
pid Process 2848 JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe 2848 JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /s" peehioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /a" peehioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /q" peehioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /e" peehioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /o" peehioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /k" peehioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /r" peehioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /i" peehioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /c" peehioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /y" peehioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /y" JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /w" peehioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /h" peehioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /u" peehioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /p" peehioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\peehioc = "C:\\Users\\Admin\\peehioc.exe /v" peehioc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language peehioc.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2848 JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe 2660 peehioc.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 2564 explorer.exe Token: SeShutdownPrivilege 2564 explorer.exe Token: SeShutdownPrivilege 2564 explorer.exe Token: SeShutdownPrivilege 2564 explorer.exe Token: SeShutdownPrivilege 2564 explorer.exe Token: SeShutdownPrivilege 2564 explorer.exe Token: SeShutdownPrivilege 2564 explorer.exe Token: SeShutdownPrivilege 2564 explorer.exe Token: SeShutdownPrivilege 2564 explorer.exe Token: SeShutdownPrivilege 2564 explorer.exe Token: SeShutdownPrivilege 2564 explorer.exe Token: SeShutdownPrivilege 2564 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
pid Process 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2848 JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe 2660 peehioc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2660 2848 JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe 31 PID 2848 wrote to memory of 2660 2848 JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe 31 PID 2848 wrote to memory of 2660 2848 JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe 31 PID 2848 wrote to memory of 2660 2848 JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a8b6168b4618452923d207145ce05fe.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\peehioc.exe"C:\Users\Admin\peehioc.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2564
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1704
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD50644639e3fa7c957523d786fc5b4de15
SHA1a2518babab9abccc93547bc3242e31f68d25f676
SHA256adfa72d8b1247e166a0a41420080a6a1be8eeb099ce8c104fd58295f6ed028ad
SHA512901a8f7e673924fb6fd901030f8499dca33b0f9a9c4da021878fd9f24f37c8be96e64e396f86d505851f23b23e4fdf723133ad6e58bcb230d25780890dd3624e