Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe
-
Size
298KB
-
MD5
24e60349407e21abe6bbabb38da6ec01
-
SHA1
6d21d0ca9fc734b8149b27c4f679a5e37c544cb1
-
SHA256
292b5f1de718219387a1f0f5903486c8fe8567cf81e691d51aed80a76a9a3984
-
SHA512
b4c6db4d1b078608a3435c737db10cf108be6edc89ec0089bb35ca2a96e6e37a3fe5c8080f8497ebd74fac27b9d6584d9322891ff3201584c914c06bcc16a568
-
SSDEEP
6144:dawjHWSIg118HWULKjC7Fif1mO45x/VN0cp0cyI0:dXjIaC7Fy45x/ko0cyI0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1340 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 wyfu.exe -
Loads dropped DLL 2 IoCs
pid Process 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\{A0DC58C8-ABEB-AD4E-8758-AF4599EB8C58} = "C:\\Users\\Admin\\AppData\\Roaming\\Feebv\\wyfu.exe" wyfu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2208 set thread context of 1340 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Privacy 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe 2212 wyfu.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe Token: SeSecurityPrivilege 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe Token: SeSecurityPrivilege 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 2212 wyfu.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2212 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2212 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2212 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2212 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 28 PID 2212 wrote to memory of 1112 2212 wyfu.exe 19 PID 2212 wrote to memory of 1112 2212 wyfu.exe 19 PID 2212 wrote to memory of 1112 2212 wyfu.exe 19 PID 2212 wrote to memory of 1112 2212 wyfu.exe 19 PID 2212 wrote to memory of 1112 2212 wyfu.exe 19 PID 2212 wrote to memory of 1176 2212 wyfu.exe 20 PID 2212 wrote to memory of 1176 2212 wyfu.exe 20 PID 2212 wrote to memory of 1176 2212 wyfu.exe 20 PID 2212 wrote to memory of 1176 2212 wyfu.exe 20 PID 2212 wrote to memory of 1176 2212 wyfu.exe 20 PID 2212 wrote to memory of 1204 2212 wyfu.exe 21 PID 2212 wrote to memory of 1204 2212 wyfu.exe 21 PID 2212 wrote to memory of 1204 2212 wyfu.exe 21 PID 2212 wrote to memory of 1204 2212 wyfu.exe 21 PID 2212 wrote to memory of 1204 2212 wyfu.exe 21 PID 2212 wrote to memory of 1996 2212 wyfu.exe 23 PID 2212 wrote to memory of 1996 2212 wyfu.exe 23 PID 2212 wrote to memory of 1996 2212 wyfu.exe 23 PID 2212 wrote to memory of 1996 2212 wyfu.exe 23 PID 2212 wrote to memory of 1996 2212 wyfu.exe 23 PID 2212 wrote to memory of 2208 2212 wyfu.exe 27 PID 2212 wrote to memory of 2208 2212 wyfu.exe 27 PID 2212 wrote to memory of 2208 2212 wyfu.exe 27 PID 2212 wrote to memory of 2208 2212 wyfu.exe 27 PID 2212 wrote to memory of 2208 2212 wyfu.exe 27 PID 2208 wrote to memory of 1340 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 29 PID 2208 wrote to memory of 1340 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 29 PID 2208 wrote to memory of 1340 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 29 PID 2208 wrote to memory of 1340 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 29 PID 2208 wrote to memory of 1340 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 29 PID 2208 wrote to memory of 1340 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 29 PID 2208 wrote to memory of 1340 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 29 PID 2208 wrote to memory of 1340 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 29 PID 2208 wrote to memory of 1340 2208 24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\24e60349407e21abe6bbabb38da6ec01_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Roaming\Feebv\wyfu.exe"C:\Users\Admin\AppData\Roaming\Feebv\wyfu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2212
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9c5585c7.bat"3⤵
- Deletes itself
PID:1340
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD556fcff9a108401bd6675f7fcd020fa64
SHA11329974fb367d3be4fb196917446f1b7bf881a8a
SHA25643e9f04c7912c5963904c99f450b43cb2ee8417b6fe23ad4e81eec883d8a8db2
SHA512ef8bd03118db7fc87ad6dd8a24e9510e50301e441e214819f60b652147300ca89f38697e8def62b5620daf1fbca49e381344dd11ac26bcfbc7086f3aff0cad77
-
Filesize
380B
MD501c61ecb0d6a9be0b7fd0ba0708de78d
SHA18dbbd30a868a03c909f3ae6ade7b5ddf453a6641
SHA256d57b14d7ab3501b8a3cc1322c276009e9b3feef7bf40c24dbe4d635e77b5219c
SHA5127f9960cef506d4fa2fa9851c52e570510d4632aa241fd64099e2457eaea1f45bbca2f1a66ebe73dfddd1c2eb020fdc29e391850f22f3300adf435ead78004415
-
Filesize
298KB
MD5f2e77f2b7336fc28830fbddf57be899e
SHA1562b2f3e354429aa091762ecafd5680cf32d0176
SHA256c66e1338bfcc2aa2eeda9bab025c4732a26e12f063fb2c1a93ab98fdc6de7fcb
SHA5127c073e9c31875391632347ac4f2d023c105b5ef0b59fb0f574e7b247db1f03112e0f7e39670948e1e5139efb5ecdf7c46dc038d0dcd48dae93b65bdbfd9e1cc8