Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe
-
Size
295KB
-
MD5
1bbb0fdb4056db958cb74aab65ff6856
-
SHA1
7cd9b7691b10b4baecba0e8cd2d67d97e794cfa7
-
SHA256
64ef90237c197a8585247b06744157a825d454d80c7ce52faff587b5d87307ef
-
SHA512
73254e4d692f62395edb8d6bea113b22731dac96ab864d038211e93c3e0e6701c71eb643d3ace2c310c41974c655d3f66b5aa1465e9bf05a0e5e1b458f2cbec5
-
SSDEEP
6144:qiGtsLgAlqNC+q+1PTG/qm/PgCnmUSFMhl4a+M/oI29FKn:RGtsLbt+D1PTEn/iUSFM8a+rI2In
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1956 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 ekqura.exe -
Loads dropped DLL 2 IoCs
pid Process 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\{2977E268-58FD-AD4F-BE57-976F9EF8B472} = "C:\\Users\\Admin\\AppData\\Roaming\\Efijiq\\ekqura.exe" ekqura.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1916 set thread context of 1956 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Privacy 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe 2000 ekqura.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 2000 ekqura.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2000 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 28 PID 1916 wrote to memory of 2000 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 28 PID 1916 wrote to memory of 2000 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 28 PID 1916 wrote to memory of 2000 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 28 PID 2000 wrote to memory of 1100 2000 ekqura.exe 19 PID 2000 wrote to memory of 1100 2000 ekqura.exe 19 PID 2000 wrote to memory of 1100 2000 ekqura.exe 19 PID 2000 wrote to memory of 1100 2000 ekqura.exe 19 PID 2000 wrote to memory of 1100 2000 ekqura.exe 19 PID 2000 wrote to memory of 1164 2000 ekqura.exe 20 PID 2000 wrote to memory of 1164 2000 ekqura.exe 20 PID 2000 wrote to memory of 1164 2000 ekqura.exe 20 PID 2000 wrote to memory of 1164 2000 ekqura.exe 20 PID 2000 wrote to memory of 1164 2000 ekqura.exe 20 PID 2000 wrote to memory of 1208 2000 ekqura.exe 21 PID 2000 wrote to memory of 1208 2000 ekqura.exe 21 PID 2000 wrote to memory of 1208 2000 ekqura.exe 21 PID 2000 wrote to memory of 1208 2000 ekqura.exe 21 PID 2000 wrote to memory of 1208 2000 ekqura.exe 21 PID 2000 wrote to memory of 488 2000 ekqura.exe 23 PID 2000 wrote to memory of 488 2000 ekqura.exe 23 PID 2000 wrote to memory of 488 2000 ekqura.exe 23 PID 2000 wrote to memory of 488 2000 ekqura.exe 23 PID 2000 wrote to memory of 488 2000 ekqura.exe 23 PID 2000 wrote to memory of 1916 2000 ekqura.exe 27 PID 2000 wrote to memory of 1916 2000 ekqura.exe 27 PID 2000 wrote to memory of 1916 2000 ekqura.exe 27 PID 2000 wrote to memory of 1916 2000 ekqura.exe 27 PID 2000 wrote to memory of 1916 2000 ekqura.exe 27 PID 1916 wrote to memory of 1956 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 29 PID 1916 wrote to memory of 1956 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 29 PID 1916 wrote to memory of 1956 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 29 PID 1916 wrote to memory of 1956 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 29 PID 1916 wrote to memory of 1956 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 29 PID 1916 wrote to memory of 1956 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 29 PID 1916 wrote to memory of 1956 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 29 PID 1916 wrote to memory of 1956 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 29 PID 1916 wrote to memory of 1956 1916 1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1bbb0fdb4056db958cb74aab65ff6856_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Roaming\Efijiq\ekqura.exe"C:\Users\Admin\AppData\Roaming\Efijiq\ekqura.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2000
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc4257694.bat"3⤵
- Deletes itself
PID:1956
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD518b7651d3c62bbeede9a81f978ec0b53
SHA1714d42437303c1c8dea71b08e680a50aa7006efe
SHA2566e56783d0c6d72a1fe23e6edf059a3f89df5863d6fb0f57f3d56e4245bb7da2f
SHA512120872f45b9d162649864657fd2cbf040e84744cfddc680cd798ead7dce9c983e0f240c26a784419e03f7b1eebd6b758e26587c97251ead32f79cf02334bc602
-
Filesize
295KB
MD519ad209ded0afe96821b08fcf11fbb24
SHA10afcb09174b1c15b0beddca8c4860e689f5b4c77
SHA256aab45faccda620c60c6ede403ba2ccd887213786c3827bb8631a42def28ec4b4
SHA512484c6b3de283ce0f9aa40e9b44c654e9780ae6b678ec931810ff5e70219ab0910d2df832f922c35f185dab6e488c5c70d8ff971d1909815b322ebd300966db64