Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 17:00
Static task
static1
Behavioral task
behavioral1
Sample
aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe
-
Size
364KB
-
MD5
aacc02afba30e38ee92e931090caee82
-
SHA1
67cb0c41525555719a873ff0de4b3e3415b6bb4c
-
SHA256
228a7fe207bdc6de3fda851b5fd8f1c0c79c671c55009c826732f65be721ba20
-
SHA512
8545c256fa89a462257e78cb491073e513232ebedeec598a66b89485194cad907295cfa0f9b7930a0e529bd72f4d4f7e7aac22697c196ef8de1f41149cb17c23
-
SSDEEP
6144:gbCdhTyzFFNIX0zE9NKFEWNFfK4CS0NwI62+fFBFFrkiWj:gmdpWNIXxcXNkjN6Zf1Fr6j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 916 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2516 afpe.exe -
Loads dropped DLL 2 IoCs
pid Process 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\{A8D7C348-7DCD-AD4F-393B-DBD01FB3F8CD} = "C:\\Users\\Admin\\AppData\\Roaming\\Vele\\afpe.exe" afpe.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1884 set thread context of 916 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 29 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Privacy aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe 2516 afpe.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 2516 afpe.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2516 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 28 PID 1884 wrote to memory of 2516 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 28 PID 1884 wrote to memory of 2516 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 28 PID 1884 wrote to memory of 2516 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 28 PID 2516 wrote to memory of 1056 2516 afpe.exe 18 PID 2516 wrote to memory of 1056 2516 afpe.exe 18 PID 2516 wrote to memory of 1056 2516 afpe.exe 18 PID 2516 wrote to memory of 1056 2516 afpe.exe 18 PID 2516 wrote to memory of 1056 2516 afpe.exe 18 PID 2516 wrote to memory of 1116 2516 afpe.exe 19 PID 2516 wrote to memory of 1116 2516 afpe.exe 19 PID 2516 wrote to memory of 1116 2516 afpe.exe 19 PID 2516 wrote to memory of 1116 2516 afpe.exe 19 PID 2516 wrote to memory of 1116 2516 afpe.exe 19 PID 2516 wrote to memory of 1160 2516 afpe.exe 21 PID 2516 wrote to memory of 1160 2516 afpe.exe 21 PID 2516 wrote to memory of 1160 2516 afpe.exe 21 PID 2516 wrote to memory of 1160 2516 afpe.exe 21 PID 2516 wrote to memory of 1160 2516 afpe.exe 21 PID 2516 wrote to memory of 1512 2516 afpe.exe 23 PID 2516 wrote to memory of 1512 2516 afpe.exe 23 PID 2516 wrote to memory of 1512 2516 afpe.exe 23 PID 2516 wrote to memory of 1512 2516 afpe.exe 23 PID 2516 wrote to memory of 1512 2516 afpe.exe 23 PID 2516 wrote to memory of 1884 2516 afpe.exe 27 PID 2516 wrote to memory of 1884 2516 afpe.exe 27 PID 2516 wrote to memory of 1884 2516 afpe.exe 27 PID 2516 wrote to memory of 1884 2516 afpe.exe 27 PID 2516 wrote to memory of 1884 2516 afpe.exe 27 PID 1884 wrote to memory of 916 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 29 PID 1884 wrote to memory of 916 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 29 PID 1884 wrote to memory of 916 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 29 PID 1884 wrote to memory of 916 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 29 PID 1884 wrote to memory of 916 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 29 PID 1884 wrote to memory of 916 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 29 PID 1884 wrote to memory of 916 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 29 PID 1884 wrote to memory of 916 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 29 PID 1884 wrote to memory of 916 1884 aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe 29 PID 2516 wrote to memory of 1712 2516 afpe.exe 33 PID 2516 wrote to memory of 1712 2516 afpe.exe 33 PID 2516 wrote to memory of 1712 2516 afpe.exe 33 PID 2516 wrote to memory of 1712 2516 afpe.exe 33 PID 2516 wrote to memory of 1712 2516 afpe.exe 33 PID 2516 wrote to memory of 1240 2516 afpe.exe 34 PID 2516 wrote to memory of 1240 2516 afpe.exe 34 PID 2516 wrote to memory of 1240 2516 afpe.exe 34 PID 2516 wrote to memory of 1240 2516 afpe.exe 34 PID 2516 wrote to memory of 1240 2516 afpe.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1056
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1116
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aacc02afba30e38ee92e931090caee82_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Roaming\Vele\afpe.exe"C:\Users\Admin\AppData\Roaming\Vele\afpe.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2516
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp1a13d408.bat"3⤵
- Deletes itself
PID:916
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1512
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1712
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5a28917b778e1a91b948b7c5ee310711b
SHA184ffa6b5cf3d13b1ceaec6df315695cb36d8ce5c
SHA256e6b5115b8b8154e70a50a72129a01e2f3e2252582cee0707a57c8e7ab05efd13
SHA512b356657d1a84a9b22dad645292bb33e7206d35d85a75e0c549725a799fd88861f0fdad10ca1df708376b899ed928eca77d5cca817c713de953a8eadda9d0b3c8
-
Filesize
364KB
MD531e7df49271d4a559947d8ff7a2ae991
SHA142bdbbe94460dec96d0a693a3c61dad67c841f85
SHA25677d6fd0d4078d348c3283c0d942df96e10918a43eb1d71d39350a72dc4468cce
SHA512775630dff431a4d9f291ae81ca8f26aee5d7bbd7c835af4d57ee3a3cd21a01034791c22dae35745e2d748751c0ce8f2236b2606e2cd91b6dea978e56fd132aec