Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
22-06-2024 11:54
Static task
static1
Behavioral task
behavioral1
Sample
020356f14633236e606e969972babe31_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
020356f14633236e606e969972babe31_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
020356f14633236e606e969972babe31_JaffaCakes118.exe
-
Size
171KB
-
MD5
020356f14633236e606e969972babe31
-
SHA1
3e8ebc61aeaf8dabcc17e8fb630cb2c75b2d2405
-
SHA256
7205337d6c5ab0aaf2ee3fdc3dc890d8a385e7eefc5115700c7034ddacad6826
-
SHA512
5bf953ae11b152b3633514e924d461300194ae562bb63f1b22af46c61c9bdb69f72b8aa28e6c1127a98bdb6aecc0b4bde453e031aa6a36acdbf840af7db5b875
-
SSDEEP
3072:HQY5swdevhaGJVeYJi8LeDUGDQYUj5uF4qHrNFAvPLq/Ns:wNwLkyM0F5JF2jqls
Malware Config
Extracted
tofsee
94.75.255.140
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2708 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
ukqp.exeukqp.exepid process 2288 ukqp.exe 1096 ukqp.exe -
Loads dropped DLL 2 IoCs
Processes:
020356f14633236e606e969972babe31_JaffaCakes118.exepid process 2788 020356f14633236e606e969972babe31_JaffaCakes118.exe 2788 020356f14633236e606e969972babe31_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
020356f14633236e606e969972babe31_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\ukqp.exe\" /r" 020356f14633236e606e969972babe31_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
020356f14633236e606e969972babe31_JaffaCakes118.exeukqp.exeukqp.exedescription pid process target process PID 2188 set thread context of 2788 2188 020356f14633236e606e969972babe31_JaffaCakes118.exe 020356f14633236e606e969972babe31_JaffaCakes118.exe PID 2288 set thread context of 1096 2288 ukqp.exe ukqp.exe PID 1096 set thread context of 2760 1096 ukqp.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
020356f14633236e606e969972babe31_JaffaCakes118.exe020356f14633236e606e969972babe31_JaffaCakes118.exeukqp.exeukqp.exedescription pid process target process PID 2188 wrote to memory of 2788 2188 020356f14633236e606e969972babe31_JaffaCakes118.exe 020356f14633236e606e969972babe31_JaffaCakes118.exe PID 2188 wrote to memory of 2788 2188 020356f14633236e606e969972babe31_JaffaCakes118.exe 020356f14633236e606e969972babe31_JaffaCakes118.exe PID 2188 wrote to memory of 2788 2188 020356f14633236e606e969972babe31_JaffaCakes118.exe 020356f14633236e606e969972babe31_JaffaCakes118.exe PID 2188 wrote to memory of 2788 2188 020356f14633236e606e969972babe31_JaffaCakes118.exe 020356f14633236e606e969972babe31_JaffaCakes118.exe PID 2188 wrote to memory of 2788 2188 020356f14633236e606e969972babe31_JaffaCakes118.exe 020356f14633236e606e969972babe31_JaffaCakes118.exe PID 2188 wrote to memory of 2788 2188 020356f14633236e606e969972babe31_JaffaCakes118.exe 020356f14633236e606e969972babe31_JaffaCakes118.exe PID 2188 wrote to memory of 2788 2188 020356f14633236e606e969972babe31_JaffaCakes118.exe 020356f14633236e606e969972babe31_JaffaCakes118.exe PID 2188 wrote to memory of 2788 2188 020356f14633236e606e969972babe31_JaffaCakes118.exe 020356f14633236e606e969972babe31_JaffaCakes118.exe PID 2188 wrote to memory of 2788 2188 020356f14633236e606e969972babe31_JaffaCakes118.exe 020356f14633236e606e969972babe31_JaffaCakes118.exe PID 2788 wrote to memory of 2288 2788 020356f14633236e606e969972babe31_JaffaCakes118.exe ukqp.exe PID 2788 wrote to memory of 2288 2788 020356f14633236e606e969972babe31_JaffaCakes118.exe ukqp.exe PID 2788 wrote to memory of 2288 2788 020356f14633236e606e969972babe31_JaffaCakes118.exe ukqp.exe PID 2788 wrote to memory of 2288 2788 020356f14633236e606e969972babe31_JaffaCakes118.exe ukqp.exe PID 2288 wrote to memory of 1096 2288 ukqp.exe ukqp.exe PID 2288 wrote to memory of 1096 2288 ukqp.exe ukqp.exe PID 2288 wrote to memory of 1096 2288 ukqp.exe ukqp.exe PID 2288 wrote to memory of 1096 2288 ukqp.exe ukqp.exe PID 2288 wrote to memory of 1096 2288 ukqp.exe ukqp.exe PID 2288 wrote to memory of 1096 2288 ukqp.exe ukqp.exe PID 2288 wrote to memory of 1096 2288 ukqp.exe ukqp.exe PID 2288 wrote to memory of 1096 2288 ukqp.exe ukqp.exe PID 2288 wrote to memory of 1096 2288 ukqp.exe ukqp.exe PID 1096 wrote to memory of 2760 1096 ukqp.exe svchost.exe PID 1096 wrote to memory of 2760 1096 ukqp.exe svchost.exe PID 1096 wrote to memory of 2760 1096 ukqp.exe svchost.exe PID 1096 wrote to memory of 2760 1096 ukqp.exe svchost.exe PID 1096 wrote to memory of 2760 1096 ukqp.exe svchost.exe PID 1096 wrote to memory of 2760 1096 ukqp.exe svchost.exe PID 2788 wrote to memory of 2708 2788 020356f14633236e606e969972babe31_JaffaCakes118.exe cmd.exe PID 2788 wrote to memory of 2708 2788 020356f14633236e606e969972babe31_JaffaCakes118.exe cmd.exe PID 2788 wrote to memory of 2708 2788 020356f14633236e606e969972babe31_JaffaCakes118.exe cmd.exe PID 2788 wrote to memory of 2708 2788 020356f14633236e606e969972babe31_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\020356f14633236e606e969972babe31_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\020356f14633236e606e969972babe31_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\020356f14633236e606e969972babe31_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\020356f14633236e606e969972babe31_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\ukqp.exe"C:\Users\Admin\ukqp.exe" /r3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\ukqp.exe"C:\Users\Admin\ukqp.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:2760
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7620.bat" "3⤵
- Deletes itself
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD5fe6bdd24593bd0898c7135aeed49cccc
SHA1fa278ae7b95b402f4d181d440974672b1dc4b84f
SHA25661b9caecdbd3a2ac217adf1c671ce53f51375e1147d7f3e78d87ba5169d79071
SHA512b693b87d0f6db69f1615f423086a97521a5dc48899eb03d276c60edeb5c26f07d5bd68cccc92ede1338f9f040088a8089912d80a2f842d011e503f2f15f54978
-
Filesize
171KB
MD5020356f14633236e606e969972babe31
SHA13e8ebc61aeaf8dabcc17e8fb630cb2c75b2d2405
SHA2567205337d6c5ab0aaf2ee3fdc3dc890d8a385e7eefc5115700c7034ddacad6826
SHA5125bf953ae11b152b3633514e924d461300194ae562bb63f1b22af46c61c9bdb69f72b8aa28e6c1127a98bdb6aecc0b4bde453e031aa6a36acdbf840af7db5b875