Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe
-
Size
106KB
-
MD5
29ca45114babce59d37bf2c45836a794
-
SHA1
973b1efebfd167d304fef2f59c8ec4ffe22a7c78
-
SHA256
3fe12c4360a1c325426c748c3dc88bd4ada95b53883e8a71ed8cfe49a9548734
-
SHA512
4c29556977c79ace3c0c12f9672cf446a01fbfcc3b1cb1a1b6e65a11ceb0ad6673e85ba8fb96ac913891171f0edfba04cfa157570c8f7b7edc784c3c75fd967c
-
SSDEEP
1536:IwGVxjjSw7LhpTkVCmJw5RH7Q3PW7UW3+EzhEpGEtJotRugCm7ZnyJSB:deVpmCmJw5qWwW3XleGQqt8Bm7ZW8
Malware Config
Extracted
tofsee
94.75.255.140
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2908 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
xmban.exexmban.exepid process 2708 xmban.exe 2748 xmban.exe -
Loads dropped DLL 3 IoCs
Processes:
29ca45114babce59d37bf2c45836a794_JaffaCakes118.exexmban.exepid process 2416 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe 2416 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe 2708 xmban.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
29ca45114babce59d37bf2c45836a794_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\xmban.exe\" /r" 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
29ca45114babce59d37bf2c45836a794_JaffaCakes118.exexmban.exexmban.exedescription pid process target process PID 2688 set thread context of 2416 2688 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe PID 2708 set thread context of 2748 2708 xmban.exe xmban.exe PID 2748 set thread context of 1768 2748 xmban.exe svchost.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
29ca45114babce59d37bf2c45836a794_JaffaCakes118.exepid process 2688 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe29ca45114babce59d37bf2c45836a794_JaffaCakes118.exexmban.exexmban.exedescription pid process target process PID 2688 wrote to memory of 2416 2688 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe PID 2688 wrote to memory of 2416 2688 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe PID 2688 wrote to memory of 2416 2688 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe PID 2688 wrote to memory of 2416 2688 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe PID 2688 wrote to memory of 2416 2688 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe PID 2688 wrote to memory of 2416 2688 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe PID 2688 wrote to memory of 2416 2688 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe PID 2688 wrote to memory of 2416 2688 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe PID 2688 wrote to memory of 2416 2688 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe PID 2416 wrote to memory of 2708 2416 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe xmban.exe PID 2416 wrote to memory of 2708 2416 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe xmban.exe PID 2416 wrote to memory of 2708 2416 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe xmban.exe PID 2416 wrote to memory of 2708 2416 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe xmban.exe PID 2416 wrote to memory of 2908 2416 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe cmd.exe PID 2416 wrote to memory of 2908 2416 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe cmd.exe PID 2416 wrote to memory of 2908 2416 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe cmd.exe PID 2416 wrote to memory of 2908 2416 29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe cmd.exe PID 2708 wrote to memory of 2748 2708 xmban.exe xmban.exe PID 2708 wrote to memory of 2748 2708 xmban.exe xmban.exe PID 2708 wrote to memory of 2748 2708 xmban.exe xmban.exe PID 2708 wrote to memory of 2748 2708 xmban.exe xmban.exe PID 2708 wrote to memory of 2748 2708 xmban.exe xmban.exe PID 2708 wrote to memory of 2748 2708 xmban.exe xmban.exe PID 2708 wrote to memory of 2748 2708 xmban.exe xmban.exe PID 2708 wrote to memory of 2748 2708 xmban.exe xmban.exe PID 2708 wrote to memory of 2748 2708 xmban.exe xmban.exe PID 2748 wrote to memory of 1768 2748 xmban.exe svchost.exe PID 2748 wrote to memory of 1768 2748 xmban.exe svchost.exe PID 2748 wrote to memory of 1768 2748 xmban.exe svchost.exe PID 2748 wrote to memory of 1768 2748 xmban.exe svchost.exe PID 2748 wrote to memory of 1768 2748 xmban.exe svchost.exe PID 2748 wrote to memory of 1768 2748 xmban.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29ca45114babce59d37bf2c45836a794_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\xmban.exe"C:\Users\Admin\xmban.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\xmban.exe"C:\Users\Admin\xmban.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:1768
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4777.bat" "3⤵
- Deletes itself
PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4777.batFilesize
117B
MD521d3883048bbda63131264b721ff870a
SHA16f3f247eb21f6315c0c88eac255b2c3294b2abcc
SHA256e7f854bf1bf04ee792e4d695f2476e086274e7ca3770c5caeb0a4782adfaf776
SHA512f89544c8af5c64a3f3404d5d6f0e65e38c8129ab792f06d19fd57430697c621ccd91b01cea7a72418983d76de9c994d81fec6098cceafac4bf4e0aa07f550ed2
-
\Users\Admin\xmban.exeFilesize
106KB
MD529ca45114babce59d37bf2c45836a794
SHA1973b1efebfd167d304fef2f59c8ec4ffe22a7c78
SHA2563fe12c4360a1c325426c748c3dc88bd4ada95b53883e8a71ed8cfe49a9548734
SHA5124c29556977c79ace3c0c12f9672cf446a01fbfcc3b1cb1a1b6e65a11ceb0ad6673e85ba8fb96ac913891171f0edfba04cfa157570c8f7b7edc784c3c75fd967c
-
memory/1768-65-0x0000000000100000-0x0000000000110000-memory.dmpFilesize
64KB
-
memory/1768-64-0x0000000000100000-0x0000000000110000-memory.dmpFilesize
64KB
-
memory/1768-63-0x0000000000100000-0x0000000000110000-memory.dmpFilesize
64KB
-
memory/1768-59-0x0000000000100000-0x0000000000110000-memory.dmpFilesize
64KB
-
memory/1768-58-0x0000000000100000-0x0000000000110000-memory.dmpFilesize
64KB
-
memory/1768-54-0x0000000000100000-0x0000000000110000-memory.dmpFilesize
64KB
-
memory/1768-52-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2416-8-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2416-32-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2416-31-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2416-18-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2416-12-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2416-0-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2416-4-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2416-2-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2416-6-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2416-10-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2748-48-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2748-37-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2748-49-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB