Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe
-
Size
377KB
-
MD5
22dbd05a27b1e0e5bf46f66c6b628049
-
SHA1
4c0d4cd0fd9a51829363672e3c955aee45b10f0b
-
SHA256
dd1b8581319471590d0bd3d56015224e48f180cfb86610a5aed471d61648cd9a
-
SHA512
d904c84b202249526fe521775e9cbf92ba6d4ba8566fc0deb41efc165de8a7248b98b767f15992aaa40c4e8a31f39c3111720b6bb88aa9d4270b5c8fdc1c315c
-
SSDEEP
6144:mB8Hev8CcOsW1D8fBUbEv8a6dRPMfbt4xb7s5evZUIVed:mmHevXfsgofybHREfbSbfvZc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1668 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2080 obfe.exe -
Loads dropped DLL 2 IoCs
pid Process 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\{2977E268-58FD-AD4F-BE57-976F9EF8B472} = "C:\\Users\\Admin\\AppData\\Roaming\\Avuri\\obfe.exe" obfe.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2116 set thread context of 1668 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Privacy 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe 2080 obfe.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 2080 obfe.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2080 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 28 PID 2116 wrote to memory of 2080 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 28 PID 2116 wrote to memory of 2080 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 28 PID 2116 wrote to memory of 2080 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 28 PID 2080 wrote to memory of 1100 2080 obfe.exe 19 PID 2080 wrote to memory of 1100 2080 obfe.exe 19 PID 2080 wrote to memory of 1100 2080 obfe.exe 19 PID 2080 wrote to memory of 1100 2080 obfe.exe 19 PID 2080 wrote to memory of 1100 2080 obfe.exe 19 PID 2080 wrote to memory of 1148 2080 obfe.exe 20 PID 2080 wrote to memory of 1148 2080 obfe.exe 20 PID 2080 wrote to memory of 1148 2080 obfe.exe 20 PID 2080 wrote to memory of 1148 2080 obfe.exe 20 PID 2080 wrote to memory of 1148 2080 obfe.exe 20 PID 2080 wrote to memory of 1180 2080 obfe.exe 21 PID 2080 wrote to memory of 1180 2080 obfe.exe 21 PID 2080 wrote to memory of 1180 2080 obfe.exe 21 PID 2080 wrote to memory of 1180 2080 obfe.exe 21 PID 2080 wrote to memory of 1180 2080 obfe.exe 21 PID 2080 wrote to memory of 1032 2080 obfe.exe 23 PID 2080 wrote to memory of 1032 2080 obfe.exe 23 PID 2080 wrote to memory of 1032 2080 obfe.exe 23 PID 2080 wrote to memory of 1032 2080 obfe.exe 23 PID 2080 wrote to memory of 1032 2080 obfe.exe 23 PID 2080 wrote to memory of 2116 2080 obfe.exe 27 PID 2080 wrote to memory of 2116 2080 obfe.exe 27 PID 2080 wrote to memory of 2116 2080 obfe.exe 27 PID 2080 wrote to memory of 2116 2080 obfe.exe 27 PID 2080 wrote to memory of 2116 2080 obfe.exe 27 PID 2116 wrote to memory of 1668 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 29 PID 2116 wrote to memory of 1668 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 29 PID 2116 wrote to memory of 1668 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 29 PID 2116 wrote to memory of 1668 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 29 PID 2116 wrote to memory of 1668 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 29 PID 2116 wrote to memory of 1668 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 29 PID 2116 wrote to memory of 1668 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 29 PID 2116 wrote to memory of 1668 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 29 PID 2116 wrote to memory of 1668 2116 22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1148
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\22dbd05a27b1e0e5bf46f66c6b628049_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Roaming\Avuri\obfe.exe"C:\Users\Admin\AppData\Roaming\Avuri\obfe.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpcd519851.bat"3⤵
- Deletes itself
PID:1668
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD535d753db72180eab2a3f2739fbbe2b7d
SHA1354d5072d1004d1d4f150d07b666bc3b52746a1f
SHA256645a4345ec45b61691d223ac36c5f1a00537319e38b31a05aec451352bc96a08
SHA512e69a2af354b8ffcabcc3f68134e34df3a2abf6bc87db9c71599ef2b2632bc2d1802caf5ffdc217e2b513de7feef92df8abdfa0ef9b991e20eff74c310963d9ab
-
Filesize
377KB
MD524ee453cb0c206aef09ccf2bd54720b4
SHA196419e874fb0d77be7b505dd1b8e5398b75c5567
SHA25621f7443d2b30075951cd5e8c80b66d05f4b5aa7f4189f5b8bb40040b6762eada
SHA51238cb39a9ae4720c87773b63404c6b28f3ea4b4e5ddff2bc7a59797c6af0d28d4abad8917b70f78afb47a6bf40cbc0b17c77cf3390007766935a2e41e23774bd7