Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe
-
Size
177KB
-
MD5
b7fd0ea6a92209a34e49b0563f63977c
-
SHA1
b2982a96eafee70b762435ab6f1adb80055ca762
-
SHA256
fa065eebc31c2e62315a443f32d8afe75d487ded72571adc014bdb9ee365e246
-
SHA512
d66b7b06a9ac4e206d138a68fb0c042a2ef9017b84685923fb480a5be92d9df3df268469e4e58ef54f5178fad03338614c007474978e61eabd69ce72cfb39993
-
SSDEEP
3072:y5VT52dzJpdQ12drw4GwLW+ICXeMie6C2ot5TU1D7YUZrGhjAtzMO4GUF+G8oiA3:yAdzDq/31oM1D7YU0Iz54GUFgxAxqG42
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 868 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2748 itask.exe -
Loads dropped DLL 2 IoCs
pid Process 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\{BAA0DD81-1DF0-87DA-C8C6-B56DAC32FEE3} = "C:\\Users\\Admin\\AppData\\Roaming\\Iwyci\\itask.exe" itask.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2436 set thread context of 868 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 30 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Privacy b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\54157750-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe 2748 itask.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeManageVolumePrivilege 2900 WinMail.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2748 itask.exe Token: SeSecurityPrivilege 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe Token: SeSecurityPrivilege 2748 itask.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2900 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2900 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2900 WinMail.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2748 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 28 PID 2436 wrote to memory of 2748 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 28 PID 2436 wrote to memory of 2748 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 28 PID 2436 wrote to memory of 2748 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 28 PID 2748 wrote to memory of 1096 2748 itask.exe 19 PID 2748 wrote to memory of 1096 2748 itask.exe 19 PID 2748 wrote to memory of 1096 2748 itask.exe 19 PID 2748 wrote to memory of 1096 2748 itask.exe 19 PID 2748 wrote to memory of 1096 2748 itask.exe 19 PID 2748 wrote to memory of 1168 2748 itask.exe 20 PID 2748 wrote to memory of 1168 2748 itask.exe 20 PID 2748 wrote to memory of 1168 2748 itask.exe 20 PID 2748 wrote to memory of 1168 2748 itask.exe 20 PID 2748 wrote to memory of 1168 2748 itask.exe 20 PID 2748 wrote to memory of 1216 2748 itask.exe 21 PID 2748 wrote to memory of 1216 2748 itask.exe 21 PID 2748 wrote to memory of 1216 2748 itask.exe 21 PID 2748 wrote to memory of 1216 2748 itask.exe 21 PID 2748 wrote to memory of 1216 2748 itask.exe 21 PID 2748 wrote to memory of 1788 2748 itask.exe 23 PID 2748 wrote to memory of 1788 2748 itask.exe 23 PID 2748 wrote to memory of 1788 2748 itask.exe 23 PID 2748 wrote to memory of 1788 2748 itask.exe 23 PID 2748 wrote to memory of 1788 2748 itask.exe 23 PID 2748 wrote to memory of 2436 2748 itask.exe 27 PID 2748 wrote to memory of 2436 2748 itask.exe 27 PID 2748 wrote to memory of 2436 2748 itask.exe 27 PID 2748 wrote to memory of 2436 2748 itask.exe 27 PID 2748 wrote to memory of 2436 2748 itask.exe 27 PID 2436 wrote to memory of 868 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 30 PID 2436 wrote to memory of 868 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 30 PID 2436 wrote to memory of 868 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 30 PID 2436 wrote to memory of 868 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 30 PID 2436 wrote to memory of 868 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 30 PID 2436 wrote to memory of 868 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 30 PID 2436 wrote to memory of 868 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 30 PID 2436 wrote to memory of 868 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 30 PID 2436 wrote to memory of 868 2436 b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe 30 PID 2748 wrote to memory of 1196 2748 itask.exe 32 PID 2748 wrote to memory of 1196 2748 itask.exe 32 PID 2748 wrote to memory of 1196 2748 itask.exe 32 PID 2748 wrote to memory of 1196 2748 itask.exe 32 PID 2748 wrote to memory of 1196 2748 itask.exe 32 PID 2748 wrote to memory of 1088 2748 itask.exe 33 PID 2748 wrote to memory of 1088 2748 itask.exe 33 PID 2748 wrote to memory of 1088 2748 itask.exe 33 PID 2748 wrote to memory of 1088 2748 itask.exe 33 PID 2748 wrote to memory of 1088 2748 itask.exe 33
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1096
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7fd0ea6a92209a34e49b0563f63977c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Roaming\Iwyci\itask.exe"C:\Users\Admin\AppData\Roaming\Iwyci\itask.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfdc3376a.bat"3⤵
- Deletes itself
PID:868
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1788
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2900
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1196
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD51e47c3336b69ccd1e4185513e88c1093
SHA1acaf41a0fed99632d03fc8f6db5e89b35cdfa448
SHA256525f44945519cb9216fe0a7be46c1e743213f995823d06c04aee76490d39fef7
SHA512d9626d2dac668743e3f3742005fe88108f4a1de27e9c56d7b5860e62d8b577992a6c3adcbc15ba9279d81a4469aa6db1b982d63a647b76d0bef03993ceffea81
-
Filesize
271B
MD5f462b0ea9d7e8db6e54de179f6d40674
SHA15ad8be7a141d5dc83cb66fd7cbfdf1725ae85602
SHA2564c6616b047355661256a7728f41aeb0090495eaddb642b1ba026b58f6a3d61de
SHA51223a28a0df4edb79b99bc764053d07a8891bd8be09345cc07d3638d7a782b83be658c7826b0daa77498ce7ce9809b61a43bb9e600464ae582b27cb10f6dc0b336
-
Filesize
380B
MD55de89d40c72f435fbc49107409496415
SHA132a1bf2c86ce7269d3f650792a3fb8e5f303606b
SHA2569e4749c39b56885dd4fd15391135f9d3291d5f995872312fb80deb815af7a0b9
SHA512eda4cdcfbbaf4b0121037c97a66444c89580cb70599eaa93a5b3b57030fd4ccb101552ce51923adaa87924c597b89f7e7ce95805b3af67c49907a7c66c2e01b4
-
Filesize
2KB
MD51e01526d977267da96d821bb67e8039e
SHA1ecc2b10c68cc0b8cf6a00d9c2230b08c7c0dfa3f
SHA256ca22628c2fe20ff538d6834be7079e66aedea2039996405db32f45a53e54e5ce
SHA51243851f26fdac83b20dc8382afe1257f718169e611182844a7b730d13426364b5e66fe14a3429e3cb5c5cd397d9042835266f5615491b9a3d6984078d06c47944
-
Filesize
12KB
MD5b417863a7a5848c6b0ca683d068b7061
SHA1efe8cb66e7b10461a6f790cdfb26f3cea6ad72fc
SHA256bbdd7764a455ce461c773d16c09bdc969e8a48060ac3ce66908dece4931e2157
SHA51200c7720f68912ce546b9f1d81419f9861499d5b709fc8ec5f1757b767de442ed2754976de182428ef8415fb88e18f71ea8fef5090134a9c6a1c39906cf461567
-
Filesize
13KB
MD5aa462dbd9fe075ea80736efa90d881fb
SHA1a7e376220fc1a040c7e26758787447a8acaa219f
SHA256619f066cf6c74379740390b501712d857abb645b6a4ee340057955ce234cb5c4
SHA5124170ec96b944f724d90cf5afda6f58de22cf90b21ade925a842965b30fbc387fbae311650b79b244779a6064bc2e3d554df7748091f1880174d1774316cfc0aa
-
Filesize
15KB
MD50e268fd984890313775a468711ab040c
SHA17823ecfa67f03a2e89d68192f10f79c9b703768f
SHA2566a5eb74a8077842d9c16a126e64f449c9b1efc3fd1b55bbe06be3e1202e79588
SHA5121467239519573d25f8477beeb5c8327670449f6735421c008a7008b41588b6245e4a0f6fd1b0a8d3043a83c775397b976f85c49693d4103dd2ca67b1b18b3d67
-
Filesize
16KB
MD5b3bec1aa912775dd9b3dd341335be6ba
SHA12baf5f4e191050dbb9eefd6f0419cf027b5f357b
SHA2569e82403d5d9c9760ed893bc296da9a650ba8a6be80b43444c40c390c80019d25
SHA512e2137bf20ec122a281d9cf17fb934bf87c02a2d01a218fb156efc48f00458599ffaf9e59eefe2f86e68e2f698e9d750f3fd41effa11649c3a85244e4fd9c0c80
-
Filesize
7KB
MD57ab2732e45867d2c26cd33a79e88265a
SHA16e6ab3f0c06e8561a1c14a1db75412c21a26c75b
SHA2569bb46f88d5803b7b164b2ae1cdd595f7e0ae9a7403762e8f79efd8f72eee2b3f
SHA5125b1ffae079d2abba7ca00ee679b6a961e0e20cc8c77291cfd5b952078790e414f21c19f5587145601795cd0cca754c3b513ba68f7e247c9e7acc6c001312c975
-
Filesize
177KB
MD54295f7253c77162c519741315948712f
SHA1154abeac6ca9fab66fcdb9548f65231e85d9c88f
SHA256d299b4d4a2f8bd7c8fc96749a3fe22d32ddbad7eb5b0148d9b34137215eb9b4e
SHA51268c9cbbb267a109b308d2326c6c461d929e2fdfb6978e6805b3311fb5a7244acaccdbb2e2ff8c0f6da6e0e72ff3c9207e955f7d41fedd71b3adba760e5f84ca0