Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 12:22
Behavioral task
behavioral1
Sample
15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe
-
Size
782KB
-
MD5
15fdb2d27414e72354d2b61fb49f0466
-
SHA1
af2bf1ef3a845191c2aa4e153de17e7fa6d6d69f
-
SHA256
e156158712cede8be39850d649229f37be75bc43258dffa8b3c7f7879a280750
-
SHA512
f9d0dbc844a8650b18e9b2938cd3d0647db519ce0b09d1edba70c121f12229526da4d4ba0b560390bcc22403e31f1f9b502efbf5e8e9499fd7602639caf4ae17
-
SSDEEP
12288:YOlx4kk9HKda4YfM/1T3PPSnPI2VAWNDTJHq9DIMTW8c1Yl:YA4Ya1fQzPPSnPFqWtTJK9DIMTW89
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2692 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
tuhui.exekorai.exepid process 2556 tuhui.exe 2884 korai.exe -
Loads dropped DLL 2 IoCs
Processes:
15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exetuhui.exepid process 2204 15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe 2556 tuhui.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 53 IoCs
Processes:
korai.exepid process 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe 2884 korai.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
korai.exedescription pid process Token: 33 2884 korai.exe Token: SeIncBasePriorityPrivilege 2884 korai.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exetuhui.exedescription pid process target process PID 2204 wrote to memory of 2556 2204 15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe tuhui.exe PID 2204 wrote to memory of 2556 2204 15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe tuhui.exe PID 2204 wrote to memory of 2556 2204 15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe tuhui.exe PID 2204 wrote to memory of 2556 2204 15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe tuhui.exe PID 2204 wrote to memory of 2692 2204 15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe cmd.exe PID 2204 wrote to memory of 2692 2204 15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe cmd.exe PID 2204 wrote to memory of 2692 2204 15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe cmd.exe PID 2204 wrote to memory of 2692 2204 15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe cmd.exe PID 2556 wrote to memory of 2884 2556 tuhui.exe korai.exe PID 2556 wrote to memory of 2884 2556 tuhui.exe korai.exe PID 2556 wrote to memory of 2884 2556 tuhui.exe korai.exe PID 2556 wrote to memory of 2884 2556 tuhui.exe korai.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\tuhui.exe"C:\Users\Admin\AppData\Local\Temp\tuhui.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\korai.exe"C:\Users\Admin\AppData\Local\Temp\korai.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5897895f2e0175ad54a36f9c8172a58b1
SHA1315d6ffac13777e442c218f2dd49c7b2c26a22e9
SHA2564697fd0747aa0aee6d9943ab0dd46fb8619af82f4f6840f75e0b94818872c479
SHA512ff924f4b98df86a87d2949c21e2b2c5fe5500132b8a54ccdc47db33a742b98ab97a3744368183cbb0e6dbf97bf1005dcd572220347385527be0aab3980c43028
-
Filesize
512B
MD526173a1aed61d5774ff9d83283b46c4b
SHA109f0a143e29dfc431c0bb3d9218d144bf4a1f663
SHA2562b153721fc9f30c602c45e2e3f90e3d570cf0c5c63876ceeba820c6f5403f53d
SHA512746453d159a4059366e3745f2a1c599dafb79e848c2303e76695016583d64be8d1da3b599fa9e219103c3da567a7787e8a6662f4e01c30100aca456200ad7344
-
Filesize
156KB
MD5b514a7c5d857f961ad80100d7201ad8d
SHA1e50bbe3294ebc94af5e9dd62e9faa2f7e3c372c2
SHA25627dd537830c5189dad9c3fc1c54f4800f76a1f9c26413f810998530bad7177c9
SHA5120592e75fba122af631ffaa4e730dc11937688fe7728634352f929fa8b16ccc393384c96a0d84ab38793ce40dbdb70addf78e511be976e9a8c4c9c8fa47a82523
-
Filesize
782KB
MD51a0214d81a472a30dbf1e92f96c4a323
SHA16ca78a44db81bf1241df5d6ab1574e62e6e0c361
SHA256e0687afbb2937d2b648a6b3f435956ebbd8f135d66747f4c0a96911b6d8d7fb4
SHA51263303bdeb30cf02b379a92429a483a97adf742874084bccf83ebce3bba5e60ad28cb0d98c8a5a309e7de6e44b459627c894e5ea94c2a128567de752684cb7d94