Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe
-
Size
325KB
-
MD5
29a05599c10c6a21d7f695c9fd3e9795
-
SHA1
90bf732e8b91e5ea8c7d93f4a3a952027591f405
-
SHA256
911179c9302e87c8d7404fc2fe717449c92762c35e2eb5ee54ebd8299fddfea1
-
SHA512
5ad1e541609fd97c422f2cac355790bfb81c1cb7f27ac5a0f96e5f25db3fcbd058b5cdea67d90f84ae861b9bcbf8d67a83fa64c1843b5f23d5401c416b37217d
-
SSDEEP
6144:p9dgAwyPmJiMIUul8RhLvEu3lrNXQqlkuQfeqnW:BDqowdvhLQAqW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2624 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2724 tyaxte.exe 2904 tyaxte.exe -
Loads dropped DLL 3 IoCs
pid Process 2688 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 2688 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 2724 tyaxte.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\{76E05B48-6E67-AD4F-AEBE-B031A9A3932C} = "C:\\Users\\Admin\\AppData\\Roaming\\Yciv\\tyaxte.exe" tyaxte.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2156 set thread context of 2688 2156 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 30 PID 2724 set thread context of 2904 2724 tyaxte.exe 32 -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe 2904 tyaxte.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2688 2156 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2688 2156 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2688 2156 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2688 2156 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2688 2156 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2688 2156 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2688 2156 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2688 2156 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2688 2156 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2724 2688 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 31 PID 2688 wrote to memory of 2724 2688 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 31 PID 2688 wrote to memory of 2724 2688 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 31 PID 2688 wrote to memory of 2724 2688 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 31 PID 2724 wrote to memory of 2904 2724 tyaxte.exe 32 PID 2724 wrote to memory of 2904 2724 tyaxte.exe 32 PID 2724 wrote to memory of 2904 2724 tyaxte.exe 32 PID 2724 wrote to memory of 2904 2724 tyaxte.exe 32 PID 2724 wrote to memory of 2904 2724 tyaxte.exe 32 PID 2724 wrote to memory of 2904 2724 tyaxte.exe 32 PID 2724 wrote to memory of 2904 2724 tyaxte.exe 32 PID 2724 wrote to memory of 2904 2724 tyaxte.exe 32 PID 2724 wrote to memory of 2904 2724 tyaxte.exe 32 PID 2688 wrote to memory of 2624 2688 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 33 PID 2688 wrote to memory of 2624 2688 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 33 PID 2688 wrote to memory of 2624 2688 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 33 PID 2688 wrote to memory of 2624 2688 29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe 33 PID 2904 wrote to memory of 1120 2904 tyaxte.exe 19 PID 2904 wrote to memory of 1120 2904 tyaxte.exe 19 PID 2904 wrote to memory of 1120 2904 tyaxte.exe 19 PID 2904 wrote to memory of 1120 2904 tyaxte.exe 19 PID 2904 wrote to memory of 1120 2904 tyaxte.exe 19 PID 2904 wrote to memory of 1188 2904 tyaxte.exe 20 PID 2904 wrote to memory of 1188 2904 tyaxte.exe 20 PID 2904 wrote to memory of 1188 2904 tyaxte.exe 20 PID 2904 wrote to memory of 1188 2904 tyaxte.exe 20 PID 2904 wrote to memory of 1188 2904 tyaxte.exe 20 PID 2904 wrote to memory of 1240 2904 tyaxte.exe 21 PID 2904 wrote to memory of 1240 2904 tyaxte.exe 21 PID 2904 wrote to memory of 1240 2904 tyaxte.exe 21 PID 2904 wrote to memory of 1240 2904 tyaxte.exe 21 PID 2904 wrote to memory of 1240 2904 tyaxte.exe 21 PID 2904 wrote to memory of 1704 2904 tyaxte.exe 25 PID 2904 wrote to memory of 1704 2904 tyaxte.exe 25 PID 2904 wrote to memory of 1704 2904 tyaxte.exe 25 PID 2904 wrote to memory of 1704 2904 tyaxte.exe 25 PID 2904 wrote to memory of 1704 2904 tyaxte.exe 25
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29a05599c10c6a21d7f695c9fd3e9795_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Roaming\Yciv\tyaxte.exe"C:\Users\Admin\AppData\Roaming\Yciv\tyaxte.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\Yciv\tyaxte.exe"C:\Users\Admin\AppData\Roaming\Yciv\tyaxte.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd68c673b.bat"4⤵
- Deletes itself
PID:2624
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD504dc8203c24345c6fcda96247d258cd1
SHA1272c739b5f7f7c512fa020e98eb0538fe062f42e
SHA256191d38eb9636e0b17e24ce9c2faf1ea8d2b19a79117b16b6ccfa7b1b6ce4de79
SHA5124d1850836676071c786053f76d0e34a9227fd66a13a85f23f5a3c498317173e8254d6f741f2a76910ed956865cb13a458589f461a871c76a9ad0dd700ab34d33
-
Filesize
325KB
MD582699e2e8a5717015135ada1aba69018
SHA10006a1a7154cfab73e9c009151b378bddf111524
SHA2563077ee856907b8fa7e9ef160797743e54d3cfd1c7254b4f23adfa40f18a75878
SHA512c87248d963a14c35ce771b66f55f7a64301191f4cefa582a911e9911a7c0f3615f05dba3f5378480870c4e3051fcda00e689ba27666388907e513fcf9b176f99