Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 18:22
Static task
static1
Behavioral task
behavioral1
Sample
f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe
-
Size
146KB
-
MD5
f40f1611ab3f0f2e68e6510f0dccd9a3
-
SHA1
5059996065bf2851c4ebde7830c91ca88f5fd580
-
SHA256
5c1a093155a50132f6f0c8ae43e3afbeeeca0af19e628b56a674920e71dd987f
-
SHA512
0715f3a760996a97279ec89ad275cdeb0e5b9e0f5ab7a6376b5a315df605f152bc06b58d9ce7fe0b55b232586976b83dc054d39790ee2cb15d3636325f92c3a2
-
SSDEEP
3072:lfzYe0x+5ZHydrsuLcKMvhXL/MkkVtJI3ED3tSG6:lfzYe0xcHydYuLiv54VzI3E96
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1572 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2140 ymwa.exe -
Loads dropped DLL 2 IoCs
pid Process 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Epomen = "C:\\Users\\Admin\\AppData\\Roaming\\Pohi\\ymwa.exe" ymwa.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2828 set thread context of 1572 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Privacy f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\4D1D7CD9-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe 2140 ymwa.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeSecurityPrivilege 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe Token: SeSecurityPrivilege 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe Token: SeSecurityPrivilege 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe Token: SeSecurityPrivilege 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe Token: SeSecurityPrivilege 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe Token: SeSecurityPrivilege 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe Token: SeSecurityPrivilege 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe Token: SeSecurityPrivilege 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe Token: SeSecurityPrivilege 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe Token: SeSecurityPrivilege 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe Token: SeManageVolumePrivilege 1412 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1412 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1412 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1412 WinMail.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2140 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 28 PID 2828 wrote to memory of 2140 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 28 PID 2828 wrote to memory of 2140 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 28 PID 2828 wrote to memory of 2140 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 28 PID 2140 wrote to memory of 1120 2140 ymwa.exe 19 PID 2140 wrote to memory of 1120 2140 ymwa.exe 19 PID 2140 wrote to memory of 1120 2140 ymwa.exe 19 PID 2140 wrote to memory of 1120 2140 ymwa.exe 19 PID 2140 wrote to memory of 1120 2140 ymwa.exe 19 PID 2140 wrote to memory of 1172 2140 ymwa.exe 20 PID 2140 wrote to memory of 1172 2140 ymwa.exe 20 PID 2140 wrote to memory of 1172 2140 ymwa.exe 20 PID 2140 wrote to memory of 1172 2140 ymwa.exe 20 PID 2140 wrote to memory of 1172 2140 ymwa.exe 20 PID 2140 wrote to memory of 1204 2140 ymwa.exe 21 PID 2140 wrote to memory of 1204 2140 ymwa.exe 21 PID 2140 wrote to memory of 1204 2140 ymwa.exe 21 PID 2140 wrote to memory of 1204 2140 ymwa.exe 21 PID 2140 wrote to memory of 1204 2140 ymwa.exe 21 PID 2140 wrote to memory of 1924 2140 ymwa.exe 23 PID 2140 wrote to memory of 1924 2140 ymwa.exe 23 PID 2140 wrote to memory of 1924 2140 ymwa.exe 23 PID 2140 wrote to memory of 1924 2140 ymwa.exe 23 PID 2140 wrote to memory of 1924 2140 ymwa.exe 23 PID 2140 wrote to memory of 2828 2140 ymwa.exe 27 PID 2140 wrote to memory of 2828 2140 ymwa.exe 27 PID 2140 wrote to memory of 2828 2140 ymwa.exe 27 PID 2140 wrote to memory of 2828 2140 ymwa.exe 27 PID 2140 wrote to memory of 2828 2140 ymwa.exe 27 PID 2828 wrote to memory of 1572 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 30 PID 2828 wrote to memory of 1572 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 30 PID 2828 wrote to memory of 1572 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 30 PID 2828 wrote to memory of 1572 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 30 PID 2828 wrote to memory of 1572 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 30 PID 2828 wrote to memory of 1572 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 30 PID 2828 wrote to memory of 1572 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 30 PID 2828 wrote to memory of 1572 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 30 PID 2828 wrote to memory of 1572 2828 f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2552 2140 ymwa.exe 32 PID 2140 wrote to memory of 2552 2140 ymwa.exe 32 PID 2140 wrote to memory of 2552 2140 ymwa.exe 32 PID 2140 wrote to memory of 2552 2140 ymwa.exe 32 PID 2140 wrote to memory of 2552 2140 ymwa.exe 32 PID 2140 wrote to memory of 2284 2140 ymwa.exe 33 PID 2140 wrote to memory of 2284 2140 ymwa.exe 33 PID 2140 wrote to memory of 2284 2140 ymwa.exe 33 PID 2140 wrote to memory of 2284 2140 ymwa.exe 33 PID 2140 wrote to memory of 2284 2140 ymwa.exe 33 PID 2140 wrote to memory of 1544 2140 ymwa.exe 34 PID 2140 wrote to memory of 1544 2140 ymwa.exe 34 PID 2140 wrote to memory of 1544 2140 ymwa.exe 34 PID 2140 wrote to memory of 1544 2140 ymwa.exe 34 PID 2140 wrote to memory of 1544 2140 ymwa.exe 34 PID 2140 wrote to memory of 636 2140 ymwa.exe 37 PID 2140 wrote to memory of 636 2140 ymwa.exe 37 PID 2140 wrote to memory of 636 2140 ymwa.exe 37 PID 2140 wrote to memory of 636 2140 ymwa.exe 37 PID 2140 wrote to memory of 636 2140 ymwa.exe 37 PID 2140 wrote to memory of 2952 2140 ymwa.exe 38 PID 2140 wrote to memory of 2952 2140 ymwa.exe 38 PID 2140 wrote to memory of 2952 2140 ymwa.exe 38 PID 2140 wrote to memory of 2952 2140 ymwa.exe 38 PID 2140 wrote to memory of 2952 2140 ymwa.exe 38
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f40f1611ab3f0f2e68e6510f0dccd9a3_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\Pohi\ymwa.exe"C:\Users\Admin\AppData\Roaming\Pohi\ymwa.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2140
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp75a1f4ec.bat"3⤵
- Deletes itself
PID:1572
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1924
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1412
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2552
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2284
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1544
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:636
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5208b14689de5468c9314aa6f7421f562
SHA1252e9aa04fcd765d6529287a3b468419b873d20a
SHA2561a0ffb04c66b0166bb2bcd348148f19c1b46f803004036b1007f866a3827b4b2
SHA5125ba121c6815ac9517090cdbe40c383063e74b17d656ba539f524ee2902b483a1a699ec3e3f2d90ce0956a5c5807878b216ad7c8b48e2a47e15254fdac869b76c
-
Filesize
271B
MD5aef4017c13cec8ba06d664498f4e9183
SHA1bacc058674c831b1ae5fefb83ba1b34e8dca51a1
SHA256f627968dc60668d233f9f0ab2f6b0a35f54667d79e39e8872cb578bcc8264bdc
SHA512f446c6f321059c03a2bd3431ffc772c9b3913b382a189864659720a0e3c9ef068fc130d8de19c724ebfee6a443bdf0424c372656bb4ee870bfadf46057e01f81
-
Filesize
4KB
MD5528f52912e4ec67430ad55259dd819a8
SHA1661208b72c6783a96dd307eb392db63a42fcce9e
SHA2560d71b3d3f55554352fc9e5b44ee60b9eedd9464f68f45dbbf24e403cc148549a
SHA5128fa2c981d13fd3328ddf3f1307c58f4a9c5299937f24a6f35da61698ac9365922d921224356eb9974deff4b1685181d869a967ca1fa67b2d8484b96cc90797ef
-
Filesize
146KB
MD5a097b354cdb6bd6c2f071fcda83b1522
SHA1b018ef44b8a04f12b6a15fbae1832782d775cc33
SHA25674deb3fa397b028be0092caf077a44bac9d3e3865b8c564670255e1f634e1ea1
SHA512f577820cfe59728d5badebcb7fdeb6973968cd880a03e86a6e6bde11c60b9f454682763fcd35dfe64a2cc68b98cb57b37e4725f83074e84df2b0b9f95e0cce98