Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe
-
Size
262KB
-
MD5
ee0adcbb4c9e73acff811a53a736a175
-
SHA1
9d28c12722a4fcb3309911ee08ad0c30a8fbcbfd
-
SHA256
a65d733a1b72befa4b7e458b5088c4429955300c4576adb964bf65e2b30b8ea5
-
SHA512
bbafd6c51867ba8f484379d80c9d7a16af76d373698d079725af7f86c23a09a5e821789cdac8b6f9e950a2e4870b51cb8d0c4bc4fb6e13c9c2df9fd620c10bbe
-
SSDEEP
6144:SX8Gp+df0afmVTRMd0dpn94sLrNXel9rb98+MAnN:g8YkfXf4TRM094svNuzrb9ZP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2208 arobe.exe -
Loads dropped DLL 1 IoCs
pid Process 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\{9001F4C8-8465-AD4E-4A54-86C64CCDA5DB} = "C:\\Users\\Admin\\AppData\\Roaming\\Ytic\\arobe.exe" arobe.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2844 set thread context of 1092 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2144 1092 WerFault.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Privacy ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe 2208 arobe.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe Token: SeSecurityPrivilege 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe Token: SeSecurityPrivilege 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 2208 arobe.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2208 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 28 PID 2844 wrote to memory of 2208 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 28 PID 2844 wrote to memory of 2208 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 28 PID 2844 wrote to memory of 2208 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 28 PID 2208 wrote to memory of 1120 2208 arobe.exe 19 PID 2208 wrote to memory of 1120 2208 arobe.exe 19 PID 2208 wrote to memory of 1120 2208 arobe.exe 19 PID 2208 wrote to memory of 1120 2208 arobe.exe 19 PID 2208 wrote to memory of 1120 2208 arobe.exe 19 PID 2208 wrote to memory of 1176 2208 arobe.exe 20 PID 2208 wrote to memory of 1176 2208 arobe.exe 20 PID 2208 wrote to memory of 1176 2208 arobe.exe 20 PID 2208 wrote to memory of 1176 2208 arobe.exe 20 PID 2208 wrote to memory of 1176 2208 arobe.exe 20 PID 2208 wrote to memory of 1248 2208 arobe.exe 21 PID 2208 wrote to memory of 1248 2208 arobe.exe 21 PID 2208 wrote to memory of 1248 2208 arobe.exe 21 PID 2208 wrote to memory of 1248 2208 arobe.exe 21 PID 2208 wrote to memory of 1248 2208 arobe.exe 21 PID 2208 wrote to memory of 1072 2208 arobe.exe 23 PID 2208 wrote to memory of 1072 2208 arobe.exe 23 PID 2208 wrote to memory of 1072 2208 arobe.exe 23 PID 2208 wrote to memory of 1072 2208 arobe.exe 23 PID 2208 wrote to memory of 1072 2208 arobe.exe 23 PID 2208 wrote to memory of 2844 2208 arobe.exe 27 PID 2208 wrote to memory of 2844 2208 arobe.exe 27 PID 2208 wrote to memory of 2844 2208 arobe.exe 27 PID 2208 wrote to memory of 2844 2208 arobe.exe 27 PID 2208 wrote to memory of 2844 2208 arobe.exe 27 PID 2844 wrote to memory of 1092 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 29 PID 2844 wrote to memory of 1092 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 29 PID 2844 wrote to memory of 1092 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 29 PID 2844 wrote to memory of 1092 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 29 PID 2844 wrote to memory of 1092 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 29 PID 2844 wrote to memory of 1092 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 29 PID 2844 wrote to memory of 1092 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 29 PID 2844 wrote to memory of 1092 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 29 PID 2844 wrote to memory of 1092 2844 ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe 29 PID 1092 wrote to memory of 2144 1092 cmd.exe 31 PID 1092 wrote to memory of 2144 1092 cmd.exe 31 PID 1092 wrote to memory of 2144 1092 cmd.exe 31 PID 1092 wrote to memory of 2144 1092 cmd.exe 31 PID 2208 wrote to memory of 628 2208 arobe.exe 30 PID 2208 wrote to memory of 628 2208 arobe.exe 30 PID 2208 wrote to memory of 628 2208 arobe.exe 30 PID 2208 wrote to memory of 628 2208 arobe.exe 30 PID 2208 wrote to memory of 628 2208 arobe.exe 30 PID 2208 wrote to memory of 2144 2208 arobe.exe 31 PID 2208 wrote to memory of 2144 2208 arobe.exe 31 PID 2208 wrote to memory of 2144 2208 arobe.exe 31 PID 2208 wrote to memory of 2144 2208 arobe.exe 31 PID 2208 wrote to memory of 2144 2208 arobe.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee0adcbb4c9e73acff811a53a736a175_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Roaming\Ytic\arobe.exe"C:\Users\Admin\AppData\Roaming\Ytic\arobe.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2208
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpdc901374.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 1124⤵
- Program crash
PID:2144
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1072
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "588204049137380188917831261221671902835-2993734741587051143-26509457-1750408368"1⤵PID:628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380B
MD5dc2dd3d910e2ddfd715fbec7ae99598d
SHA1e4404239ba969fc798ab459cd972dca663229f0f
SHA25628f60f851b1dddb6c92615f58cd8f802f248c310e386de0fda7455bfcf47e7e1
SHA5128a1097c97acf1bdb8e015c5d8e823b33c87216344761673b3792a878584e039d029c31b8a2f666ebe781b7f501c5421654b4e6f2a0025c716bcf642794c8d326
-
Filesize
262KB
MD5027ae951b42ffd0fbdf65d38ecd5f22c
SHA1e88bd33bc88b897443f3bc38bcb968ed3bbc1c5d
SHA256190140dd6b2915244fe00ab1cc64d5d79508492c80a06ad8c8b6557e35fb4a7c
SHA5122ec5eabfe2c0c09119eac96350abb4c8e2a17a1d8b7ef7ebd37ab029f096cb97ed734f647e74cd3faedb15e29c72879429648437d90fcba1cd65f3af5d1f4519