Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe
-
Size
603KB
-
MD5
eddc25a649b2f0d76959caccd6c1a8a5
-
SHA1
2fc23cb063507be7a70ce0e1d6a69258beec498c
-
SHA256
13b74b7ca4091d1cdb7b20592c948e6bdab75c888eb0d12ee1f5ffdbe31b25c5
-
SHA512
65abd9a05395ece43a8087c040e7e5698f196b01681787012e6307c2dc231b1fcf347f9c61086ea6ce1d340b3eb9e1838e7c97b6aad34bb1d2ba774bc223cd7a
-
SSDEEP
12288:5uuLXm8bJoafouHtstuiIkET4Hypk65Sqa5+Khn94WO0BAfteZ6LYDDKX5rwk2Gd:nTm8byafoIsRDET35vPfrqDKX5rg6
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1608 durio.exe 1532 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\{8B55598B-08B0-6D5B-4ACD-9423E1F3CC4C} = "C:\\Users\\Admin\\AppData\\Roaming\\Imtape\\durio.exe" durio.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1248 set thread context of 1532 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Privacy eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\69CD3A51-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe 1608 durio.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: 33 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: 33 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: 33 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: 33 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: 33 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: 33 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: 33 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: 33 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: 33 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: 33 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: 33 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: 33 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: 33 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: 33 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeSecurityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeSecurityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeSecurityPrivilege 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe Token: SeManageVolumePrivilege 2868 WinMail.exe Token: SeSecurityPrivilege 1532 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2868 WinMail.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1608 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 28 PID 1248 wrote to memory of 1608 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 28 PID 1248 wrote to memory of 1608 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 28 PID 1248 wrote to memory of 1608 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 28 PID 1608 wrote to memory of 1212 1608 durio.exe 19 PID 1608 wrote to memory of 1212 1608 durio.exe 19 PID 1608 wrote to memory of 1212 1608 durio.exe 19 PID 1608 wrote to memory of 1212 1608 durio.exe 19 PID 1608 wrote to memory of 1212 1608 durio.exe 19 PID 1608 wrote to memory of 1276 1608 durio.exe 20 PID 1608 wrote to memory of 1276 1608 durio.exe 20 PID 1608 wrote to memory of 1276 1608 durio.exe 20 PID 1608 wrote to memory of 1276 1608 durio.exe 20 PID 1608 wrote to memory of 1276 1608 durio.exe 20 PID 1608 wrote to memory of 1336 1608 durio.exe 21 PID 1608 wrote to memory of 1336 1608 durio.exe 21 PID 1608 wrote to memory of 1336 1608 durio.exe 21 PID 1608 wrote to memory of 1336 1608 durio.exe 21 PID 1608 wrote to memory of 1336 1608 durio.exe 21 PID 1608 wrote to memory of 1248 1608 durio.exe 27 PID 1608 wrote to memory of 1248 1608 durio.exe 27 PID 1608 wrote to memory of 1248 1608 durio.exe 27 PID 1608 wrote to memory of 1248 1608 durio.exe 27 PID 1608 wrote to memory of 1248 1608 durio.exe 27 PID 1608 wrote to memory of 2868 1608 durio.exe 29 PID 1608 wrote to memory of 2868 1608 durio.exe 29 PID 1608 wrote to memory of 2868 1608 durio.exe 29 PID 1608 wrote to memory of 2868 1608 durio.exe 29 PID 1608 wrote to memory of 2868 1608 durio.exe 29 PID 1248 wrote to memory of 1532 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 30 PID 1248 wrote to memory of 1532 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 30 PID 1248 wrote to memory of 1532 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 30 PID 1248 wrote to memory of 1532 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 30 PID 1248 wrote to memory of 1532 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 30 PID 1248 wrote to memory of 1532 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 30 PID 1248 wrote to memory of 1532 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 30 PID 1248 wrote to memory of 1532 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 30 PID 1248 wrote to memory of 1532 1248 eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe 30 PID 1608 wrote to memory of 320 1608 durio.exe 32 PID 1608 wrote to memory of 320 1608 durio.exe 32 PID 1608 wrote to memory of 320 1608 durio.exe 32 PID 1608 wrote to memory of 320 1608 durio.exe 32 PID 1608 wrote to memory of 320 1608 durio.exe 32 PID 1608 wrote to memory of 2924 1608 durio.exe 33 PID 1608 wrote to memory of 2924 1608 durio.exe 33 PID 1608 wrote to memory of 2924 1608 durio.exe 33 PID 1608 wrote to memory of 2924 1608 durio.exe 33 PID 1608 wrote to memory of 2924 1608 durio.exe 33 PID 1608 wrote to memory of 2716 1608 durio.exe 34 PID 1608 wrote to memory of 2716 1608 durio.exe 34 PID 1608 wrote to memory of 2716 1608 durio.exe 34 PID 1608 wrote to memory of 2716 1608 durio.exe 34 PID 1608 wrote to memory of 2716 1608 durio.exe 34 PID 1608 wrote to memory of 2440 1608 durio.exe 37 PID 1608 wrote to memory of 2440 1608 durio.exe 37 PID 1608 wrote to memory of 2440 1608 durio.exe 37 PID 1608 wrote to memory of 2440 1608 durio.exe 37 PID 1608 wrote to memory of 2440 1608 durio.exe 37 PID 1608 wrote to memory of 2888 1608 durio.exe 38 PID 1608 wrote to memory of 2888 1608 durio.exe 38 PID 1608 wrote to memory of 2888 1608 durio.exe 38 PID 1608 wrote to memory of 2888 1608 durio.exe 38 PID 1608 wrote to memory of 2888 1608 durio.exe 38
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1212
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1276
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eddc25a649b2f0d76959caccd6c1a8a5_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2012.10.01T15.53\Native\STUBEXE\@APPDATALOCAL@\Xenocode\Sandbox\1.0.0.0\2012.10.01T15.51\Native\STUBEXE\@APPDATA@\Imtape\durio.exe"C:\Users\Admin\AppData\Roaming\Imtape\durio.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1608
-
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2012.10.01T15.53\Native\STUBEXE\@APPDATALOCAL@\Xenocode\Sandbox\1.0.0.0\2012.10.01T15.51\Native\STUBEXE\@SYSTEM@\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd14a9cf6.bat"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2868
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:320
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2924
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2716
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2440
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5e1b32eb793ef2d6dbd54e6a7734ad1ee
SHA1ecaa7f5cf5b286a5e88dc653a8e8294d0021ace3
SHA25630269855bc887ef938734545421056ebcec21035551e44ae0041dcce9513c672
SHA512aea85b6aed1befa858501baba730f51c20dc5c1d9821b21eb4da91331ec3fd42f86eb45c8fdffcea00f78c7ff16d73a19ff2870eb250e444cd1f1155b57ea3dd
-
Filesize
161B
MD531e30af9fe84b27324687b5a1092f0de
SHA1b86d61ffcbf3f30da9507990db6f00ee566bc1df
SHA25659f5376ce64317f1c91a3d3ba8beab4435a4ef43276c4d7f786044b4e92314aa
SHA512c9170798ee13dd5704347d9e60a69a96e576814c213ea85d10ee9d9a041ff515b0f6a892b107829f69ca89c2450f59ac5942150ddbe59c16134980fad69f7620
-
Filesize
325B
MD55794310d06df8c29205c5dbf80f0dfda
SHA1d5d5dc51224c1d2a45bf340c4b0acc2d7658e65b
SHA256d1eba8ea3e8530358e0502eb7e063bc7588c146eea40885ad2db5b5f02394c0b
SHA512981d06497a8fe00712ebe1466cb9c0bfcd460c44ea009ce1088d9a59ac023f6e3e2990ac89753a5fc4e4503404b4dbc7e91dc0214490b2ffe358be344df149ea
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2012.10.01T15.53\Native\STUBEXE\@APPDATALOCAL@\Xenocode\Sandbox\1.0.0.0\2012.10.01T15.51\Native\STUBEXE\@APPDATA@\Imtape\durio.exe
Filesize16KB
MD5f8cce100b3b4a562a10da59fb416754e
SHA155e2f3a276b2466bc89db1a2c3f30782502454ab
SHA25668d1e61989de24dc8e051379fb371f74aa6cbbcb0c3896a3542bd24e3d125649
SHA5120cdadc5dae7e69ce0470f50d471e6850f99734747e09734b9e7c05b45a43c36b58793f8ffca2c06df47a620bf1afa9c14c4b250f491868a8c14e146d98de8963
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2012.10.01T15.53\Native\STUBEXE\@APPDATALOCAL@\Xenocode\Sandbox\1.0.0.0\2012.10.01T15.51\Native\STUBEXE\@SYSTEM@\cmd.exe
Filesize16KB
MD543cf6d53eb497a3b345bc559ad6c1e5d
SHA1a8db71511cac5293300982576a3d154758b8e295
SHA256c5d6f582285d9b3bb7c90a3ddcb2885311f0958658272b64c193deca020ec05a
SHA512cc60880b1a0946e6b2c60fbf0d52036a32f95844bca0e38362e0cb6415afa67aa83d764b30874636875ca07d6bde4a2e432c2dcc6524879cc0a3720cb95b79ab
-
Filesize
138KB
MD571236d1dbe96f898b194c20856dce83b
SHA18449c63157b0903fe72c777e3216f7d1d1bdb568
SHA25686b609ebc1942d157f1334f42103a606c48e86cc7612caf648748c0be1ac1862
SHA512a5579dec2a9f4cbda94914dfdfac2520722d9c734798af5c542d710f485724bd58aec6097e1edb809b3e0c68af748b7dd8aaa131038c8a7a2869637271e2de87