Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe
-
Size
297KB
-
MD5
25cf7127991c2d6b249cfda5716c735b
-
SHA1
b92abb6c60a7ec2fbf8c19147f5a91cc73745f60
-
SHA256
bec2afb3070b94e6420c7f7ce11fd46a386d78a246e3bf921a8c7f46d28512b4
-
SHA512
a15e559c22b16ee444cd4fafab2bbc27ce258db4a384eec6c1f46a77e7c139812c56a9cc3550e31daa59be054f38499d1d2bb8a12073aa0a13a9c29dab9b24db
-
SSDEEP
6144:10DuLqyd3oxcdzBjcufgM7e3lSQtx0PoOKEtq70uHRinFBqLTabu0bok3K:ODou+BjcufWlvAoOKEtY/xUBqLSxbok6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2492 reipdo.exe -
Loads dropped DLL 2 IoCs
pid Process 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\{E97AF648-8469-AD4E-B6B3-012D8E7B2230} = "C:\\Users\\Admin\\AppData\\Roaming\\Tutexi\\reipdo.exe" reipdo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2156 set thread context of 2692 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Privacy 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe 2492 reipdo.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 2492 reipdo.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2492 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 28 PID 2156 wrote to memory of 2492 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 28 PID 2156 wrote to memory of 2492 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 28 PID 2156 wrote to memory of 2492 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 28 PID 2492 wrote to memory of 1044 2492 reipdo.exe 17 PID 2492 wrote to memory of 1044 2492 reipdo.exe 17 PID 2492 wrote to memory of 1044 2492 reipdo.exe 17 PID 2492 wrote to memory of 1044 2492 reipdo.exe 17 PID 2492 wrote to memory of 1044 2492 reipdo.exe 17 PID 2492 wrote to memory of 1060 2492 reipdo.exe 18 PID 2492 wrote to memory of 1060 2492 reipdo.exe 18 PID 2492 wrote to memory of 1060 2492 reipdo.exe 18 PID 2492 wrote to memory of 1060 2492 reipdo.exe 18 PID 2492 wrote to memory of 1060 2492 reipdo.exe 18 PID 2492 wrote to memory of 1112 2492 reipdo.exe 20 PID 2492 wrote to memory of 1112 2492 reipdo.exe 20 PID 2492 wrote to memory of 1112 2492 reipdo.exe 20 PID 2492 wrote to memory of 1112 2492 reipdo.exe 20 PID 2492 wrote to memory of 1112 2492 reipdo.exe 20 PID 2492 wrote to memory of 1316 2492 reipdo.exe 23 PID 2492 wrote to memory of 1316 2492 reipdo.exe 23 PID 2492 wrote to memory of 1316 2492 reipdo.exe 23 PID 2492 wrote to memory of 1316 2492 reipdo.exe 23 PID 2492 wrote to memory of 1316 2492 reipdo.exe 23 PID 2492 wrote to memory of 2156 2492 reipdo.exe 27 PID 2492 wrote to memory of 2156 2492 reipdo.exe 27 PID 2492 wrote to memory of 2156 2492 reipdo.exe 27 PID 2492 wrote to memory of 2156 2492 reipdo.exe 27 PID 2492 wrote to memory of 2156 2492 reipdo.exe 27 PID 2156 wrote to memory of 2692 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 29 PID 2156 wrote to memory of 2692 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 29 PID 2156 wrote to memory of 2692 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 29 PID 2156 wrote to memory of 2692 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 29 PID 2156 wrote to memory of 2692 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 29 PID 2156 wrote to memory of 2692 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 29 PID 2156 wrote to memory of 2692 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 29 PID 2156 wrote to memory of 2692 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 29 PID 2156 wrote to memory of 2692 2156 25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe 29
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1044
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1060
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25cf7127991c2d6b249cfda5716c735b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Roaming\Tutexi\reipdo.exe"C:\Users\Admin\AppData\Roaming\Tutexi\reipdo.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2492
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa764b79a.bat"3⤵
- Deletes itself
PID:2692
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5e22baec37bddb9f0faa647182a65861e
SHA17de823c03f9352db33c5f2f28249c9451d343484
SHA256212d1bd25ac9bcd79008b7d6039004db808d003cebbaa4440e3d0bac2ef9adeb
SHA512f7bcf76d60bff10dd53fb9c56ea538bdffb085b37b281ac9c81e21561d76e4cd687dfc5024cec6f3de188ca4319bf01c9d30c9d0e17ed2078d0a975c0b59ea2d
-
Filesize
297KB
MD58eed1f31c3dad46f5fdac5dd13f50865
SHA137d67da7a13b3013718b53933fdf37871dee634f
SHA2566f93a0d305960a05f27cb0018990dc1e9602587b803b2bc838718c9d1da95d92
SHA512502ba833ae663c11e66a38c81d8af8aaf1eeea0de96665233c9b130eec3ac70505ea0ae08f5f7771cc102a804ac716c36b4ae847bd32010afd9c9688a2675eff