Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 17:15
Static task
static1
Behavioral task
behavioral1
Sample
081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe
-
Size
306KB
-
MD5
081ef821bb5d109d904439d142b41fc1
-
SHA1
e79dc450b6bb62f9c81d3bbd0c0c2c1304ee6284
-
SHA256
af1c0948c016b09643c8052d970c62b1f078245e667190a70fc05251ccf0be6e
-
SHA512
7251afa06592f3acdc4154ba76b2a724602345a35619af60ab007cd114be046d12037bc91f0d2a8cf265255b355b641cb392b5b706e5e271525d218fcaf33a40
-
SSDEEP
6144:WZgK4d8HTqfyYbq2qrdUQO9qqXPNNyAzG9T7kV0C/C:WmKE8HDlRTO9qqfGAUT7kKC/C
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2140 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2348 ugyj.exe -
Loads dropped DLL 1 IoCs
pid Process 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D8EAE6C8-7DED-AD4F-4306-79414A995A5C} = "C:\\Users\\Admin\\AppData\\Roaming\\Jusy\\ugyj.exe" ugyj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 2140 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Privacy 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe 2348 ugyj.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 2348 ugyj.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2348 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 28 PID 2372 wrote to memory of 2348 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 28 PID 2372 wrote to memory of 2348 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 28 PID 2372 wrote to memory of 2348 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 28 PID 2348 wrote to memory of 1068 2348 ugyj.exe 18 PID 2348 wrote to memory of 1068 2348 ugyj.exe 18 PID 2348 wrote to memory of 1068 2348 ugyj.exe 18 PID 2348 wrote to memory of 1068 2348 ugyj.exe 18 PID 2348 wrote to memory of 1068 2348 ugyj.exe 18 PID 2348 wrote to memory of 1124 2348 ugyj.exe 19 PID 2348 wrote to memory of 1124 2348 ugyj.exe 19 PID 2348 wrote to memory of 1124 2348 ugyj.exe 19 PID 2348 wrote to memory of 1124 2348 ugyj.exe 19 PID 2348 wrote to memory of 1124 2348 ugyj.exe 19 PID 2348 wrote to memory of 1168 2348 ugyj.exe 21 PID 2348 wrote to memory of 1168 2348 ugyj.exe 21 PID 2348 wrote to memory of 1168 2348 ugyj.exe 21 PID 2348 wrote to memory of 1168 2348 ugyj.exe 21 PID 2348 wrote to memory of 1168 2348 ugyj.exe 21 PID 2348 wrote to memory of 2124 2348 ugyj.exe 23 PID 2348 wrote to memory of 2124 2348 ugyj.exe 23 PID 2348 wrote to memory of 2124 2348 ugyj.exe 23 PID 2348 wrote to memory of 2124 2348 ugyj.exe 23 PID 2348 wrote to memory of 2124 2348 ugyj.exe 23 PID 2348 wrote to memory of 2372 2348 ugyj.exe 27 PID 2348 wrote to memory of 2372 2348 ugyj.exe 27 PID 2348 wrote to memory of 2372 2348 ugyj.exe 27 PID 2348 wrote to memory of 2372 2348 ugyj.exe 27 PID 2348 wrote to memory of 2372 2348 ugyj.exe 27 PID 2372 wrote to memory of 2140 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 29 PID 2372 wrote to memory of 2140 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 29 PID 2372 wrote to memory of 2140 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 29 PID 2372 wrote to memory of 2140 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 29 PID 2372 wrote to memory of 2140 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 29 PID 2372 wrote to memory of 2140 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 29 PID 2372 wrote to memory of 2140 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 29 PID 2372 wrote to memory of 2140 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 29 PID 2372 wrote to memory of 2140 2372 081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1068
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1124
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\Jusy\ugyj.exe"C:\Users\Admin\AppData\Roaming\Jusy\ugyj.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf8a9d24f.bat"3⤵
- Deletes itself
PID:2140
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5584f8f60d57953b4df876e90d3b7cb72
SHA13a866dafa29f2270fa5ac364e6ec5fae884caed5
SHA2561d06b96ce17be53ddc4ea9dbf69cf66ee0b0cf935070952d1bdb88d4a64d545e
SHA51248cebc26397d4feb737a62142d1bfb7663dd37cc33259404e2e9aa694243d8c66cd8b6bd7c62df95e30263ddbd4399f877cc5817738db98b3f9ae1338a09dabe
-
Filesize
306KB
MD519d7a436aab88c66500700235f3e6a0f
SHA1e7a5575f4433889f2dbbaa04a148cb060dbf8c0f
SHA2560862b842de3a0776e240965bb7a298d50c1675475a461b829a47f232810fadb9
SHA512a57a104a4d2d17a21507a43e5bed8658f80efd3fd1fc075aa73271f1ff1f5912ea27cd86cfce3de0ca1a2ae6e7869819a6972e373cfd6e59d60bed55ba157176