Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe
-
Size
321KB
-
MD5
07a3315220771c299a430cb54daddb7a
-
SHA1
169f3ff05e83e662981a2013e00df0ee2cf8e295
-
SHA256
c8a428dc1bf9b38d97953ae952e3a4f2b530c38efd9e0e3c571ad6bedc0a46d2
-
SHA512
02e6fb1d4467b4f22458dee14a89a7919860824c78d935a592a56bb46897fc92368b71fc2d9ff017e5d7dc0a2c242a61d7369e32562e8a712268f5107c9fca0f
-
SSDEEP
6144:AT+FQo0d7h+swMHScIOq1G/PtRnC2CkErfof:zFh0DhycBqwtRC2gcf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2452 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2296 ecozmu.exe -
Loads dropped DLL 2 IoCs
pid Process 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\{A8D7C348-7DCD-AD4F-393B-DBD01FB3F8CD} = "C:\\Users\\Admin\\AppData\\Roaming\\Avyxi\\ecozmu.exe" ecozmu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1688 set thread context of 2452 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Privacy 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe 2296 ecozmu.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 2296 ecozmu.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2296 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 28 PID 1688 wrote to memory of 2296 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 28 PID 1688 wrote to memory of 2296 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 28 PID 1688 wrote to memory of 2296 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 28 PID 2296 wrote to memory of 1120 2296 ecozmu.exe 19 PID 2296 wrote to memory of 1120 2296 ecozmu.exe 19 PID 2296 wrote to memory of 1120 2296 ecozmu.exe 19 PID 2296 wrote to memory of 1120 2296 ecozmu.exe 19 PID 2296 wrote to memory of 1120 2296 ecozmu.exe 19 PID 2296 wrote to memory of 1172 2296 ecozmu.exe 20 PID 2296 wrote to memory of 1172 2296 ecozmu.exe 20 PID 2296 wrote to memory of 1172 2296 ecozmu.exe 20 PID 2296 wrote to memory of 1172 2296 ecozmu.exe 20 PID 2296 wrote to memory of 1172 2296 ecozmu.exe 20 PID 2296 wrote to memory of 1212 2296 ecozmu.exe 21 PID 2296 wrote to memory of 1212 2296 ecozmu.exe 21 PID 2296 wrote to memory of 1212 2296 ecozmu.exe 21 PID 2296 wrote to memory of 1212 2296 ecozmu.exe 21 PID 2296 wrote to memory of 1212 2296 ecozmu.exe 21 PID 2296 wrote to memory of 1032 2296 ecozmu.exe 23 PID 2296 wrote to memory of 1032 2296 ecozmu.exe 23 PID 2296 wrote to memory of 1032 2296 ecozmu.exe 23 PID 2296 wrote to memory of 1032 2296 ecozmu.exe 23 PID 2296 wrote to memory of 1032 2296 ecozmu.exe 23 PID 2296 wrote to memory of 1688 2296 ecozmu.exe 27 PID 2296 wrote to memory of 1688 2296 ecozmu.exe 27 PID 2296 wrote to memory of 1688 2296 ecozmu.exe 27 PID 2296 wrote to memory of 1688 2296 ecozmu.exe 27 PID 2296 wrote to memory of 1688 2296 ecozmu.exe 27 PID 1688 wrote to memory of 2452 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 29 PID 1688 wrote to memory of 2452 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 29 PID 1688 wrote to memory of 2452 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 29 PID 1688 wrote to memory of 2452 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 29 PID 1688 wrote to memory of 2452 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 29 PID 1688 wrote to memory of 2452 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 29 PID 1688 wrote to memory of 2452 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 29 PID 1688 wrote to memory of 2452 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 29 PID 1688 wrote to memory of 2452 1688 07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe 29 PID 2296 wrote to memory of 456 2296 ecozmu.exe 33 PID 2296 wrote to memory of 456 2296 ecozmu.exe 33 PID 2296 wrote to memory of 456 2296 ecozmu.exe 33 PID 2296 wrote to memory of 456 2296 ecozmu.exe 33 PID 2296 wrote to memory of 456 2296 ecozmu.exe 33 PID 2296 wrote to memory of 2864 2296 ecozmu.exe 34 PID 2296 wrote to memory of 2864 2296 ecozmu.exe 34 PID 2296 wrote to memory of 2864 2296 ecozmu.exe 34 PID 2296 wrote to memory of 2864 2296 ecozmu.exe 34 PID 2296 wrote to memory of 2864 2296 ecozmu.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07a3315220771c299a430cb54daddb7a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Roaming\Avyxi\ecozmu.exe"C:\Users\Admin\AppData\Roaming\Avyxi\ecozmu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2296
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpb908f8f4.bat"3⤵
- Deletes itself
PID:2452
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1032
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:456
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5af53d4f5d6a982bc7ceb7e080320a140
SHA1abadd5210762275b9ae97a230eb281abe4deadd0
SHA256d26c38a453f314fd97b5295d15f6b376242b134ecfea82e48a05c35c3f7dd16b
SHA51269e2e80e4a3bd313721e324391a1a2b08054581b5d5185b4c33cccdedd18b3dd49ae9a90aaa9e233e6cf9e16bd678c284dce7def19cd791cfe05aff3472090d6
-
Filesize
321KB
MD5644c3ea4f2b41a3afb597c61a61e3a46
SHA12373690e006fdcea39d2efefc407bf598aa98f43
SHA2562ad7adf43e73d6389538aed1f0e23b416849a82f47fd89e713db7a093ff5b936
SHA51269e18f626805c745bab1e4b5a1185df8a8737c56107d9166e99e7e056a9ffb304b76cfa8e4880226e5aab1e91ec900f7b19c9c89b917e06dcf93e18d7a4b7e2a