Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 10:37
Static task
static1
Behavioral task
behavioral1
Sample
283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe
-
Size
327KB
-
MD5
283f49e1e7af1107ce1fdb3e62815026
-
SHA1
530230d0caede75419be075691a37b3295a6b9ae
-
SHA256
dab5d49baf62b43b7f95df3f0e0070a42975f0239fc3e2e2da161b00540927c6
-
SHA512
7558ae9bc436d8775c7610d96670eb6854771b51a120d5d472ba2bc5daeb4cba2361c50ae3c674e3e51dbeea3c1d1678dfb69a879c103b97dce6aa24e8926e31
-
SSDEEP
6144:AdHFCf9vsBqU8cCK6Taz6u/eHu+QqKTSs6Nj81YFrec:QFTBqU806OzMdaSsKFT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2564 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2656 otykca.exe 2636 otykca.exe -
Loads dropped DLL 2 IoCs
pid Process 1900 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 1900 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\{2977E268-58FD-AD4F-BE57-976F9EF8B472} = "C:\\Users\\Admin\\AppData\\Roaming\\Geroby\\otykca.exe" otykca.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2244 set thread context of 1900 2244 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 28 PID 2656 set thread context of 2636 2656 otykca.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Privacy 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe 2636 otykca.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1900 2244 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 28 PID 2244 wrote to memory of 1900 2244 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 28 PID 2244 wrote to memory of 1900 2244 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 28 PID 2244 wrote to memory of 1900 2244 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 28 PID 2244 wrote to memory of 1900 2244 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 28 PID 2244 wrote to memory of 1900 2244 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 28 PID 2244 wrote to memory of 1900 2244 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 28 PID 2244 wrote to memory of 1900 2244 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 28 PID 2244 wrote to memory of 1900 2244 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 28 PID 1900 wrote to memory of 2656 1900 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 29 PID 1900 wrote to memory of 2656 1900 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 29 PID 1900 wrote to memory of 2656 1900 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 29 PID 1900 wrote to memory of 2656 1900 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 29 PID 2656 wrote to memory of 2636 2656 otykca.exe 30 PID 2656 wrote to memory of 2636 2656 otykca.exe 30 PID 2656 wrote to memory of 2636 2656 otykca.exe 30 PID 2656 wrote to memory of 2636 2656 otykca.exe 30 PID 2656 wrote to memory of 2636 2656 otykca.exe 30 PID 2656 wrote to memory of 2636 2656 otykca.exe 30 PID 2656 wrote to memory of 2636 2656 otykca.exe 30 PID 2656 wrote to memory of 2636 2656 otykca.exe 30 PID 2656 wrote to memory of 2636 2656 otykca.exe 30 PID 2636 wrote to memory of 1104 2636 otykca.exe 19 PID 2636 wrote to memory of 1104 2636 otykca.exe 19 PID 2636 wrote to memory of 1104 2636 otykca.exe 19 PID 2636 wrote to memory of 1104 2636 otykca.exe 19 PID 2636 wrote to memory of 1104 2636 otykca.exe 19 PID 2636 wrote to memory of 1180 2636 otykca.exe 20 PID 2636 wrote to memory of 1180 2636 otykca.exe 20 PID 2636 wrote to memory of 1180 2636 otykca.exe 20 PID 2636 wrote to memory of 1180 2636 otykca.exe 20 PID 2636 wrote to memory of 1180 2636 otykca.exe 20 PID 2636 wrote to memory of 1208 2636 otykca.exe 21 PID 2636 wrote to memory of 1208 2636 otykca.exe 21 PID 2636 wrote to memory of 1208 2636 otykca.exe 21 PID 2636 wrote to memory of 1208 2636 otykca.exe 21 PID 2636 wrote to memory of 1208 2636 otykca.exe 21 PID 2636 wrote to memory of 2252 2636 otykca.exe 23 PID 2636 wrote to memory of 2252 2636 otykca.exe 23 PID 2636 wrote to memory of 2252 2636 otykca.exe 23 PID 2636 wrote to memory of 2252 2636 otykca.exe 23 PID 2636 wrote to memory of 2252 2636 otykca.exe 23 PID 2636 wrote to memory of 1900 2636 otykca.exe 28 PID 2636 wrote to memory of 1900 2636 otykca.exe 28 PID 2636 wrote to memory of 1900 2636 otykca.exe 28 PID 2636 wrote to memory of 1900 2636 otykca.exe 28 PID 2636 wrote to memory of 1900 2636 otykca.exe 28 PID 2636 wrote to memory of 2564 2636 otykca.exe 31 PID 2636 wrote to memory of 2564 2636 otykca.exe 31 PID 2636 wrote to memory of 2564 2636 otykca.exe 31 PID 2636 wrote to memory of 2564 2636 otykca.exe 31 PID 2636 wrote to memory of 2564 2636 otykca.exe 31 PID 1900 wrote to memory of 2564 1900 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2564 1900 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2564 1900 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2564 1900 283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Roaming\Geroby\otykca.exe"C:\Users\Admin\AppData\Roaming\Geroby\otykca.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Roaming\Geroby\otykca.exe"C:\Users\Admin\AppData\Roaming\Geroby\otykca.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpef55b5b3.bat"4⤵
- Deletes itself
PID:2564
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD531d4a02dd2f3f123fa6998767262f02f
SHA1af28bdd26b04e1efaa011f4cf672c9983a94ce3a
SHA2567f5ad651f4d590131457d1676904aa0e02ae8a8b4d35b162084e872a7c49c36d
SHA512b55f92441d3d301fad27d56f7c3ecec6334a5d86509ca50156a89c2d6aaf674c7fffac2a68d856043df1784787255814a5e61bc87075a2a4e5887c245bcab6af
-
Filesize
327KB
MD53c113644a1821806d552b1dd975ce7af
SHA1d4069600603b0c006bd310d2f3fb68c2010f4496
SHA25620e26fbc5a16c57078041d157fed3e88b5035cb4778d2f964957c39e23eede5c
SHA512a8680936779bf7e5f6cb85dddbf415b13fcae984ac03ea82a973dc7755140ba69ba5fabe81d6d9a07f3788c3154060521e1087c1211979f82dd0c88665dc2171