Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
7095a724461739b15822fd0dd49b327f_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7095a724461739b15822fd0dd49b327f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
7095a724461739b15822fd0dd49b327f_JaffaCakes118.exe
-
Size
3.7MB
-
MD5
7095a724461739b15822fd0dd49b327f
-
SHA1
3d98b504b552c0b86912aaaec3cb9658f8b9260e
-
SHA256
15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd
-
SHA512
1753efee3a36f8aeb6fec810433e7f07feef30774b9ba65d6c3487862f88f64fc006e12a166a306f1be1974fb1e50129587897d63b919e700c9dbf8abd1a2272
-
SSDEEP
98304:g+ESKW5B12R2kdVLOOFzAg8vQ6ygfk537ZP:glSh12ftMgR/R7ZP
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1684-17405-0x0000000000400000-0x000000000057C000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 3 IoCs
Processes:
QMDesktopAnimation.exelsass.exelsass.exepid process 2200 QMDesktopAnimation.exe 2168 lsass.exe 1684 lsass.exe -
Loads dropped DLL 5 IoCs
Processes:
7095a724461739b15822fd0dd49b327f_JaffaCakes118.exeQMDesktopAnimation.exepid process 1800 7095a724461739b15822fd0dd49b327f_JaffaCakes118.exe 2200 QMDesktopAnimation.exe 2200 QMDesktopAnimation.exe 2200 QMDesktopAnimation.exe 2200 QMDesktopAnimation.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
QMDesktopAnimation.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360°²È«·þÎñ = "C:\\Users\\QMDesktopAnimation.exe" QMDesktopAnimation.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 39 IoCs
Processes:
7095a724461739b15822fd0dd49b327f_JaffaCakes118.exelsass.exelsass.exepid process 1800 7095a724461739b15822fd0dd49b327f_JaffaCakes118.exe 2168 lsass.exe 2168 lsass.exe 1684 lsass.exe 1684 lsass.exe 2168 lsass.exe 1684 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe 2168 lsass.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
7095a724461739b15822fd0dd49b327f_JaffaCakes118.exepid process 1800 7095a724461739b15822fd0dd49b327f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
7095a724461739b15822fd0dd49b327f_JaffaCakes118.exeQMDesktopAnimation.exelsass.exelsass.exepid process 1800 7095a724461739b15822fd0dd49b327f_JaffaCakes118.exe 1800 7095a724461739b15822fd0dd49b327f_JaffaCakes118.exe 2200 QMDesktopAnimation.exe 2168 lsass.exe 1684 lsass.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7095a724461739b15822fd0dd49b327f_JaffaCakes118.exeQMDesktopAnimation.exedescription pid process target process PID 1800 wrote to memory of 2200 1800 7095a724461739b15822fd0dd49b327f_JaffaCakes118.exe QMDesktopAnimation.exe PID 1800 wrote to memory of 2200 1800 7095a724461739b15822fd0dd49b327f_JaffaCakes118.exe QMDesktopAnimation.exe PID 1800 wrote to memory of 2200 1800 7095a724461739b15822fd0dd49b327f_JaffaCakes118.exe QMDesktopAnimation.exe PID 1800 wrote to memory of 2200 1800 7095a724461739b15822fd0dd49b327f_JaffaCakes118.exe QMDesktopAnimation.exe PID 2200 wrote to memory of 2168 2200 QMDesktopAnimation.exe lsass.exe PID 2200 wrote to memory of 2168 2200 QMDesktopAnimation.exe lsass.exe PID 2200 wrote to memory of 2168 2200 QMDesktopAnimation.exe lsass.exe PID 2200 wrote to memory of 2168 2200 QMDesktopAnimation.exe lsass.exe PID 2200 wrote to memory of 1684 2200 QMDesktopAnimation.exe lsass.exe PID 2200 wrote to memory of 1684 2200 QMDesktopAnimation.exe lsass.exe PID 2200 wrote to memory of 1684 2200 QMDesktopAnimation.exe lsass.exe PID 2200 wrote to memory of 1684 2200 QMDesktopAnimation.exe lsass.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7095a724461739b15822fd0dd49b327f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7095a724461739b15822fd0dd49b327f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\QMDesktopAnimation.exeC:\Users\QMDesktopAnimation.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Public\lsass.exeC:\Users\Public\lsass.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
C:\Users\Public\lsass.exeC:\Users\Public\lsass.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5be31e9cbf3aaa02fec9a6dc2fe49b8f1
SHA1dd554ece008b8d5a9425fa7b5792033e42217484
SHA256931bd3c45bca3a6766e67870457663ae386c04a4983b57cd10b83c1c5fddd19a
SHA5129757bee88f27d9e5a860f3a69046e23bbfea39521c09bb59476fcf5e53eea530e04d717ebe1805a0af78c5d8e4cf0d988fe1e94c1e1c5543c89449debe070a0a
-
Filesize
1.5MB
MD54d223a6a4e9402cca12dfb8ac4cb470e
SHA15e2a470561d4a788bc53e8ebbfc208eccc98f390
SHA256bdc9e471d303f81dbf0a62a50d86e45647505786b3cdf7a0d14a4595a4ae68e1
SHA512091a5e194d45d02f7f156bc611c4c35ed19ab8bf0b806dcbfd2fc63f72837000fcc52e981bb7c980302cecbbca29ae941f30b7136a97c90953b94383e384dd29
-
Filesize
69KB
MD53d924b86f8dc8215ea1dcda84c218ad7
SHA1bff3baea1ea9f1eef642773382d6e8945fa5bf8c
SHA256a429ee865286dc2be99cb61ac2ed8f29c148aabd7f77943e65114744bc4df98b
SHA512bab02ad0a21b44692bf60db8600872290274b44212febae90c6cf99e09a30c516493253da52b3d80b4fe805100e90fde953b8674c4c8e11911e187dd12dbc7ff