Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe
-
Size
256KB
-
MD5
02a7740de855d2790ee5df23f71005a9
-
SHA1
f8e9dd23f4f2a78105f4d055ca3365156be816f8
-
SHA256
5489fd95ccd263e254fe71ed8f227540854d3d6ac48c72a99cf384579cfca0cf
-
SHA512
334996386958c8031019d991eb338c3ed07460378fc92f7e60ed4a673a39576950c27adb6f085b8a0524363edaba7b5c373c90e7caae452e62e915caa3c2d918
-
SSDEEP
6144:SYlMkl24UDer8cAUJ66WH67T54LZ07M4M8NVb+A:rlMkSDU8UJV8uTS90oGvb3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2136 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2992 oniqp.exe -
Loads dropped DLL 2 IoCs
pid Process 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\{2977E268-58FD-AD4F-BE57-976F9EF8B472} = "C:\\Users\\Admin\\AppData\\Roaming\\Moum\\oniqp.exe" oniqp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2400 set thread context of 2136 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Privacy 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe 2992 oniqp.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 2992 oniqp.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2992 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 28 PID 2400 wrote to memory of 2992 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 28 PID 2400 wrote to memory of 2992 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 28 PID 2400 wrote to memory of 2992 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 28 PID 2992 wrote to memory of 1080 2992 oniqp.exe 18 PID 2992 wrote to memory of 1080 2992 oniqp.exe 18 PID 2992 wrote to memory of 1080 2992 oniqp.exe 18 PID 2992 wrote to memory of 1080 2992 oniqp.exe 18 PID 2992 wrote to memory of 1080 2992 oniqp.exe 18 PID 2992 wrote to memory of 1088 2992 oniqp.exe 19 PID 2992 wrote to memory of 1088 2992 oniqp.exe 19 PID 2992 wrote to memory of 1088 2992 oniqp.exe 19 PID 2992 wrote to memory of 1088 2992 oniqp.exe 19 PID 2992 wrote to memory of 1088 2992 oniqp.exe 19 PID 2992 wrote to memory of 1168 2992 oniqp.exe 21 PID 2992 wrote to memory of 1168 2992 oniqp.exe 21 PID 2992 wrote to memory of 1168 2992 oniqp.exe 21 PID 2992 wrote to memory of 1168 2992 oniqp.exe 21 PID 2992 wrote to memory of 1168 2992 oniqp.exe 21 PID 2992 wrote to memory of 1788 2992 oniqp.exe 23 PID 2992 wrote to memory of 1788 2992 oniqp.exe 23 PID 2992 wrote to memory of 1788 2992 oniqp.exe 23 PID 2992 wrote to memory of 1788 2992 oniqp.exe 23 PID 2992 wrote to memory of 1788 2992 oniqp.exe 23 PID 2992 wrote to memory of 2400 2992 oniqp.exe 27 PID 2992 wrote to memory of 2400 2992 oniqp.exe 27 PID 2992 wrote to memory of 2400 2992 oniqp.exe 27 PID 2992 wrote to memory of 2400 2992 oniqp.exe 27 PID 2992 wrote to memory of 2400 2992 oniqp.exe 27 PID 2400 wrote to memory of 2136 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2136 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2136 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2136 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2136 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2136 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2136 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2136 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2136 2400 02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1080
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1088
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02a7740de855d2790ee5df23f71005a9_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\Moum\oniqp.exe"C:\Users\Admin\AppData\Roaming\Moum\oniqp.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2992
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp42734246.bat"3⤵
- Deletes itself
PID:2136
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5173446ad804c025c2b81092314a69ee4
SHA19f3489f5830365206c702ad56edc89cfe6ea522e
SHA2561fb7794432867b28ec6e4426c4082f977d56225c790bb798592c10da68289490
SHA51285f0f2ef55908f228ef3bc753ef5f9efd8bc5eae35efae1e12491244771abd49424f69ec2b92cdeeaf8008e2432a37c04eb25cbd4430d871610b0837579f3467
-
Filesize
256KB
MD59f4dd44f4b7a26e39ef4848b162bce49
SHA1e90bcebac653816f2e3b351afaaa146e0eb10efb
SHA25691a527353ad474ef5425ace961e54b62f2abf96c4f2ab21b1d1df2b0e6a067e2
SHA512f30745bf87bbfe41df23e62660853d3c629ce12bbb201c75be4d5fee35e8d5fdf1294d5a2b441477a05f1fb796d263bfa9305f8de2a7b7fa8d49453b8850f76e