Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 04:22
Behavioral task
behavioral1
Sample
18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe
-
Size
149KB
-
MD5
18c23cdcfdabcbf9895078e22f3486e3
-
SHA1
3d682af9bd3e12a69d17323666da7a0dd2944a28
-
SHA256
ab639258fd77fad01f00a822c17868297745fe1f8b0c8c4b60ddd9cb17686d0e
-
SHA512
a580ed9d1e0d346fc630b2cf6ac822fa53b6365da59dd1502c0acd971c3681cef5812187cc7eb29fef45ed653d89ba538c6d7fe78db5966115894fa5c2e367a2
-
SSDEEP
3072:ElgUVvwzRWNNj6jj2r2rSpLLZziBNUsJoiOt3NvdHdctjbF2bP:agUV4zskyr2GNZziUviC3NlHAZ2j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1608 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1708 ytuwt.exe -
Loads dropped DLL 2 IoCs
pid Process 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2484-0-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2484-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/files/0x001800000001386d-16.dat upx behavioral1/memory/2484-24-0x0000000000280000-0x00000000002EC000-memory.dmp upx behavioral1/memory/1708-26-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\{3701E6D4-7A3B-7959-7861-9A2A3A1B7B21} = "C:\\Users\\Admin\\AppData\\Roaming\\Xegyty\\ytuwt.exe" ytuwt.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2484 set thread context of 1608 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Privacy 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1708 ytuwt.exe 1708 ytuwt.exe 1708 ytuwt.exe 1708 ytuwt.exe 1708 ytuwt.exe 1708 ytuwt.exe 1708 ytuwt.exe 1708 ytuwt.exe 1708 ytuwt.exe 1708 ytuwt.exe 1708 ytuwt.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe Token: SeSecurityPrivilege 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe Token: SeSecurityPrivilege 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2484 wrote to memory of 1708 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 30 PID 2484 wrote to memory of 1708 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 30 PID 2484 wrote to memory of 1708 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 30 PID 2484 wrote to memory of 1708 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 30 PID 1708 wrote to memory of 1116 1708 ytuwt.exe 19 PID 1708 wrote to memory of 1116 1708 ytuwt.exe 19 PID 1708 wrote to memory of 1116 1708 ytuwt.exe 19 PID 1708 wrote to memory of 1116 1708 ytuwt.exe 19 PID 1708 wrote to memory of 1116 1708 ytuwt.exe 19 PID 1708 wrote to memory of 1172 1708 ytuwt.exe 20 PID 1708 wrote to memory of 1172 1708 ytuwt.exe 20 PID 1708 wrote to memory of 1172 1708 ytuwt.exe 20 PID 1708 wrote to memory of 1172 1708 ytuwt.exe 20 PID 1708 wrote to memory of 1172 1708 ytuwt.exe 20 PID 1708 wrote to memory of 1204 1708 ytuwt.exe 21 PID 1708 wrote to memory of 1204 1708 ytuwt.exe 21 PID 1708 wrote to memory of 1204 1708 ytuwt.exe 21 PID 1708 wrote to memory of 1204 1708 ytuwt.exe 21 PID 1708 wrote to memory of 1204 1708 ytuwt.exe 21 PID 1708 wrote to memory of 2484 1708 ytuwt.exe 27 PID 1708 wrote to memory of 2484 1708 ytuwt.exe 27 PID 1708 wrote to memory of 2484 1708 ytuwt.exe 27 PID 1708 wrote to memory of 2484 1708 ytuwt.exe 27 PID 1708 wrote to memory of 2484 1708 ytuwt.exe 27 PID 2484 wrote to memory of 1608 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 31 PID 2484 wrote to memory of 1608 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 31 PID 2484 wrote to memory of 1608 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 31 PID 2484 wrote to memory of 1608 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 31 PID 2484 wrote to memory of 1608 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 31 PID 2484 wrote to memory of 1608 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 31 PID 2484 wrote to memory of 1608 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 31 PID 2484 wrote to memory of 1608 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 31 PID 2484 wrote to memory of 1608 2484 18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe 31 PID 1708 wrote to memory of 1140 1708 ytuwt.exe 33 PID 1708 wrote to memory of 1140 1708 ytuwt.exe 33 PID 1708 wrote to memory of 1140 1708 ytuwt.exe 33 PID 1708 wrote to memory of 1140 1708 ytuwt.exe 33 PID 1708 wrote to memory of 1140 1708 ytuwt.exe 33 PID 1708 wrote to memory of 2228 1708 ytuwt.exe 34 PID 1708 wrote to memory of 2228 1708 ytuwt.exe 34 PID 1708 wrote to memory of 2228 1708 ytuwt.exe 34 PID 1708 wrote to memory of 2228 1708 ytuwt.exe 34 PID 1708 wrote to memory of 2228 1708 ytuwt.exe 34 PID 1708 wrote to memory of 2820 1708 ytuwt.exe 35 PID 1708 wrote to memory of 2820 1708 ytuwt.exe 35 PID 1708 wrote to memory of 2820 1708 ytuwt.exe 35 PID 1708 wrote to memory of 2820 1708 ytuwt.exe 35 PID 1708 wrote to memory of 2820 1708 ytuwt.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\18c23cdcfdabcbf9895078e22f3486e3_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Roaming\Xegyty\ytuwt.exe"C:\Users\Admin\AppData\Roaming\Xegyty\ytuwt.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6e01b7f6.bat"3⤵
- Deletes itself
PID:1608
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1140
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2228
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5e435afed4fa6fb0db78638348e7cfcd8
SHA146426c5fd2c1e0ffe046f3e2c82c64823b26ff73
SHA25648ef01dcd7667c93677d4ac2ca97dc5da360b2028934b043d3efb6e693201ad4
SHA5128b3c325a30b043c728222bd07a8be16d986e596727b7412584b90ea35d63b74755865f6808ba9ff37da619adb5316c133a6a89c0bfc60bd151777ddf83f14119
-
Filesize
380B
MD58585a152c5702ad9af15b818147de5ba
SHA135fdfc4f8c14f5a1d42b8138aee05295acb44d4f
SHA2564daabf36465e4e800433abd6e1769cd6503effc7accba52c95d86361d3f6d448
SHA512a8ce6d2c0753d58177701407d52dde4a4bc088376706f3390a2331e7f3e014ea9837377a9d2c701790e633c036a1234e4b781e59d0d42da86d64a600bf9853db
-
Filesize
149KB
MD5026c803df2488a3f2d090cda21c03b54
SHA1efecc007eb691ff52d822adf5f0f5547757942a4
SHA25633b4f84f74de087e30c97b984f9a64dab95778d00c959cc2b8c73e158d02d0b7
SHA512cc6a3240766d75bf888377678ac44b3a3f38438d603c1cbb0d91c436e2bff53a315b3e0bbb248a05b0729ed4c60fa1837603129f440a4a7638845fa4e6c38660