Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 10:22
Static task
static1
Behavioral task
behavioral1
Sample
2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe
-
Size
374KB
-
MD5
2201d6e11a8a3ba0d84e24d91af642d7
-
SHA1
d21f9a9a5b880cfe37d189128c9e021b57850db4
-
SHA256
7910b7ea31d604fbbfe578a943d402b69f26f41b0c4a4070982509f1617ca5c7
-
SHA512
4d789a2ae43e5e204cb7390a24d73f728bb9a7a5ac6823d9e5c9d2d105172874343f531a6164e016ec7e7dee2c734efaea54111d3dc65364dd88334709424f0b
-
SSDEEP
6144:uAXnN5hW63cPkLCWp+kxLaazQ/rJ6aQ/URPERT2ElYRktprr5tk:uA95ht3cPkLXp+k5bzQ/V6a/h4eur/k
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1220 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2096 yxkaip.exe -
Loads dropped DLL 2 IoCs
pid Process 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\{A0DC58C8-ABEB-AD4E-8758-AF4599EB8C58} = "C:\\Users\\Admin\\AppData\\Roaming\\Gadu\\yxkaip.exe" yxkaip.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2164 set thread context of 1220 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Privacy 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe 2096 yxkaip.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 2096 yxkaip.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2096 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 28 PID 2164 wrote to memory of 2096 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 28 PID 2164 wrote to memory of 2096 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 28 PID 2164 wrote to memory of 2096 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 28 PID 2096 wrote to memory of 1112 2096 yxkaip.exe 19 PID 2096 wrote to memory of 1112 2096 yxkaip.exe 19 PID 2096 wrote to memory of 1112 2096 yxkaip.exe 19 PID 2096 wrote to memory of 1112 2096 yxkaip.exe 19 PID 2096 wrote to memory of 1112 2096 yxkaip.exe 19 PID 2096 wrote to memory of 1168 2096 yxkaip.exe 20 PID 2096 wrote to memory of 1168 2096 yxkaip.exe 20 PID 2096 wrote to memory of 1168 2096 yxkaip.exe 20 PID 2096 wrote to memory of 1168 2096 yxkaip.exe 20 PID 2096 wrote to memory of 1168 2096 yxkaip.exe 20 PID 2096 wrote to memory of 1188 2096 yxkaip.exe 21 PID 2096 wrote to memory of 1188 2096 yxkaip.exe 21 PID 2096 wrote to memory of 1188 2096 yxkaip.exe 21 PID 2096 wrote to memory of 1188 2096 yxkaip.exe 21 PID 2096 wrote to memory of 1188 2096 yxkaip.exe 21 PID 2096 wrote to memory of 852 2096 yxkaip.exe 23 PID 2096 wrote to memory of 852 2096 yxkaip.exe 23 PID 2096 wrote to memory of 852 2096 yxkaip.exe 23 PID 2096 wrote to memory of 852 2096 yxkaip.exe 23 PID 2096 wrote to memory of 852 2096 yxkaip.exe 23 PID 2096 wrote to memory of 2164 2096 yxkaip.exe 27 PID 2096 wrote to memory of 2164 2096 yxkaip.exe 27 PID 2096 wrote to memory of 2164 2096 yxkaip.exe 27 PID 2096 wrote to memory of 2164 2096 yxkaip.exe 27 PID 2096 wrote to memory of 2164 2096 yxkaip.exe 27 PID 2164 wrote to memory of 1220 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 29 PID 2164 wrote to memory of 1220 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 29 PID 2164 wrote to memory of 1220 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 29 PID 2164 wrote to memory of 1220 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 29 PID 2164 wrote to memory of 1220 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 29 PID 2164 wrote to memory of 1220 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 29 PID 2164 wrote to memory of 1220 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 29 PID 2164 wrote to memory of 1220 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 29 PID 2164 wrote to memory of 1220 2164 2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe 29 PID 2096 wrote to memory of 2576 2096 yxkaip.exe 33 PID 2096 wrote to memory of 2576 2096 yxkaip.exe 33 PID 2096 wrote to memory of 2576 2096 yxkaip.exe 33 PID 2096 wrote to memory of 2576 2096 yxkaip.exe 33 PID 2096 wrote to memory of 2576 2096 yxkaip.exe 33 PID 2096 wrote to memory of 2572 2096 yxkaip.exe 34 PID 2096 wrote to memory of 2572 2096 yxkaip.exe 34 PID 2096 wrote to memory of 2572 2096 yxkaip.exe 34 PID 2096 wrote to memory of 2572 2096 yxkaip.exe 34 PID 2096 wrote to memory of 2572 2096 yxkaip.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2201d6e11a8a3ba0d84e24d91af642d7_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Roaming\Gadu\yxkaip.exe"C:\Users\Admin\AppData\Roaming\Gadu\yxkaip.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2096
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd0cb3a55.bat"3⤵
- Deletes itself
PID:1220
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:852
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2576
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5651da0d9eb3c83abacd92ee4e2dec86e
SHA175b4e6ae934888a332896eb32d912c566bec375f
SHA25675ab4f9f9ff11d9f3e0db939096d1333a2ffdd67322282800b7460b8f7ad4e43
SHA512a226742bae703aef2187548a1fdc08ed302100f1c15b8c05d0df8f7100a66e85a3184439295c3b5afbcb3a9d0528a331b018070ad3d12ffd19d818b4995206c9
-
Filesize
374KB
MD573fbbafdaeb0bbd6690268fb39d69e23
SHA1c0865e066491f442ae542beb0aa869790ef94e06
SHA256865ff0534d38fb19b6d952e5ae603f5307d368cf6ba26414ec1dda0911a3beb4
SHA5126d009de31efbc733adf0b54ac7344c5ce61883d66d5a337607c727ddeb8ad9eef8a5a3bdf12b784a9ed21b772fc13c2c75c44622bdc25ddbe6516757f398be88