Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe
-
Size
203KB
-
MD5
20a593c3191819c317ebec02b91bea06
-
SHA1
1dd2075cc22c5046378ae4e52e7fdf93239a3cab
-
SHA256
f178506baf568a80ca371e2a0b78287e1e007c577a540bf0bf4b47ea9242f15b
-
SHA512
2b02c02ba73b9f09c1a2ab3174c8c4c693fcbea46f694216c592f7a198bc49a70f61dec756efa12ec8213174abc9915c1904a8100df4498c66b51f7ed4376054
-
SSDEEP
6144:JCkWKpuCstx5AR8YBz0u0WVBO9uYjj46DyD0ej2om:JCkWMzsf5Zo4sYjk6CF2om
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2556 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1768 taosa.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\WINE 20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\WINE taosa.exe -
Loads dropped DLL 2 IoCs
pid Process 2336 20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe 2336 20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\taosa.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Imex\\taosa.exe" taosa.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe 1768 taosa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2336 20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1768 2336 20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe 28 PID 2336 wrote to memory of 1768 2336 20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe 28 PID 2336 wrote to memory of 1768 2336 20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe 28 PID 2336 wrote to memory of 1768 2336 20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe 28 PID 1768 wrote to memory of 1104 1768 taosa.exe 19 PID 1768 wrote to memory of 1104 1768 taosa.exe 19 PID 1768 wrote to memory of 1104 1768 taosa.exe 19 PID 1768 wrote to memory of 1104 1768 taosa.exe 19 PID 1768 wrote to memory of 1104 1768 taosa.exe 19 PID 1768 wrote to memory of 1104 1768 taosa.exe 19 PID 1768 wrote to memory of 1104 1768 taosa.exe 19 PID 1768 wrote to memory of 1104 1768 taosa.exe 19 PID 1768 wrote to memory of 1168 1768 taosa.exe 20 PID 1768 wrote to memory of 1168 1768 taosa.exe 20 PID 1768 wrote to memory of 1168 1768 taosa.exe 20 PID 1768 wrote to memory of 1168 1768 taosa.exe 20 PID 1768 wrote to memory of 1168 1768 taosa.exe 20 PID 1768 wrote to memory of 1168 1768 taosa.exe 20 PID 1768 wrote to memory of 1168 1768 taosa.exe 20 PID 1768 wrote to memory of 1168 1768 taosa.exe 20 PID 1768 wrote to memory of 1196 1768 taosa.exe 21 PID 1768 wrote to memory of 1196 1768 taosa.exe 21 PID 1768 wrote to memory of 1196 1768 taosa.exe 21 PID 1768 wrote to memory of 1196 1768 taosa.exe 21 PID 1768 wrote to memory of 1196 1768 taosa.exe 21 PID 1768 wrote to memory of 1196 1768 taosa.exe 21 PID 1768 wrote to memory of 1196 1768 taosa.exe 21 PID 1768 wrote to memory of 1196 1768 taosa.exe 21 PID 1768 wrote to memory of 1588 1768 taosa.exe 23 PID 1768 wrote to memory of 1588 1768 taosa.exe 23 PID 1768 wrote to memory of 1588 1768 taosa.exe 23 PID 1768 wrote to memory of 1588 1768 taosa.exe 23 PID 1768 wrote to memory of 1588 1768 taosa.exe 23 PID 1768 wrote to memory of 1588 1768 taosa.exe 23 PID 1768 wrote to memory of 1588 1768 taosa.exe 23 PID 1768 wrote to memory of 1588 1768 taosa.exe 23 PID 1768 wrote to memory of 2336 1768 taosa.exe 27 PID 1768 wrote to memory of 2336 1768 taosa.exe 27 PID 1768 wrote to memory of 2336 1768 taosa.exe 27 PID 1768 wrote to memory of 2336 1768 taosa.exe 27 PID 1768 wrote to memory of 2336 1768 taosa.exe 27 PID 1768 wrote to memory of 2336 1768 taosa.exe 27 PID 1768 wrote to memory of 2336 1768 taosa.exe 27 PID 1768 wrote to memory of 2336 1768 taosa.exe 27 PID 2336 wrote to memory of 2556 2336 20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2556 2336 20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2556 2336 20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2556 2336 20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe 29 PID 1768 wrote to memory of 3028 1768 taosa.exe 31 PID 1768 wrote to memory of 3028 1768 taosa.exe 31 PID 1768 wrote to memory of 3028 1768 taosa.exe 31 PID 1768 wrote to memory of 3028 1768 taosa.exe 31 PID 1768 wrote to memory of 3028 1768 taosa.exe 31 PID 1768 wrote to memory of 3028 1768 taosa.exe 31 PID 1768 wrote to memory of 3028 1768 taosa.exe 31 PID 1768 wrote to memory of 3028 1768 taosa.exe 31 PID 1768 wrote to memory of 1652 1768 taosa.exe 32 PID 1768 wrote to memory of 1652 1768 taosa.exe 32 PID 1768 wrote to memory of 1652 1768 taosa.exe 32 PID 1768 wrote to memory of 1652 1768 taosa.exe 32 PID 1768 wrote to memory of 1652 1768 taosa.exe 32 PID 1768 wrote to memory of 1652 1768 taosa.exe 32 PID 1768 wrote to memory of 1652 1768 taosa.exe 32 PID 1768 wrote to memory of 1652 1768 taosa.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\20a593c3191819c317ebec02b91bea06_JaffaCakes118.exe"2⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Roaming\Imex\taosa.exe"C:\Users\Admin\AppData\Roaming\Imex\taosa.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1768
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8261f3e8.bat"3⤵
- Deletes itself
PID:2556
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1588
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3028
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1652
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2992
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5c59268fb4036910ada3ed6fa6ae7e341
SHA1ed096299105cad372c1209c966887de6b0a75cef
SHA2563b525901da40e20581064b6e64aa2bd706d3930754516347ab6fb25eedd328a8
SHA512db7e5bb538e7540591653831fcb5e23225ae6daf113c27053b65037e73083fb1c13f2830a2ce9c74d61f0bad7fecf133f59c21576b5fb8b4110141a513ff4218
-
Filesize
203KB
MD55a3a108189a873ae7c93dc758aacad49
SHA188c6df33d84da4d6e2e80c4c1a803830ea90cfab
SHA25631f4ca9bd7f8ef34527e69b262703e695f923e7755c9258581e1c8fd8dbbc947
SHA512841cd8884fd2a3cdd3d2db066e26067bdfeb552b346eb543a3bafcb63442e355301cff6d2efecec5968bdfa0da744a36dff5841a911aa324b0464653dbd5a370