Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 03:46
Static task
static1
Behavioral task
behavioral1
Sample
2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe
-
Size
312KB
-
MD5
2adf340f8eb4e0b7f88e81fd3e0a8f77
-
SHA1
00164ce5256308a5b20996c88a76ca264f304fa9
-
SHA256
8ebe03547f8b79c62ea127820926f88c51d0b155679af0c8dc18b5e606fd78a1
-
SHA512
c5a25a125d339b87dcce65c2973c0db3949b24a946830ce40882c3471996125e7c27c5c8f6864fd6329fa54162d4b8f9da8772a7db768542bbb515dc2318cd80
-
SSDEEP
6144:xWI+jNXUeQPFTdCRTy7wzFzRODpyUOr2//X2TnLo0D/I:EIQUrdCvxzKy1rc/XsC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2700 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2260 haviz.exe -
Loads dropped DLL 1 IoCs
pid Process 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\{1B0C4E28-6E66-AD4F-AB1D-A71BBF328406} = "C:\\Users\\Admin\\AppData\\Roaming\\Urofn\\haviz.exe" haviz.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1964 set thread context of 2700 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe 32 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Privacy 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe 2260 haviz.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2260 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2260 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2260 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2260 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe 31 PID 2260 wrote to memory of 1116 2260 haviz.exe 19 PID 2260 wrote to memory of 1116 2260 haviz.exe 19 PID 2260 wrote to memory of 1116 2260 haviz.exe 19 PID 2260 wrote to memory of 1116 2260 haviz.exe 19 PID 2260 wrote to memory of 1116 2260 haviz.exe 19 PID 2260 wrote to memory of 1176 2260 haviz.exe 20 PID 2260 wrote to memory of 1176 2260 haviz.exe 20 PID 2260 wrote to memory of 1176 2260 haviz.exe 20 PID 2260 wrote to memory of 1176 2260 haviz.exe 20 PID 2260 wrote to memory of 1176 2260 haviz.exe 20 PID 2260 wrote to memory of 1252 2260 haviz.exe 21 PID 2260 wrote to memory of 1252 2260 haviz.exe 21 PID 2260 wrote to memory of 1252 2260 haviz.exe 21 PID 2260 wrote to memory of 1252 2260 haviz.exe 21 PID 2260 wrote to memory of 1252 2260 haviz.exe 21 PID 2260 wrote to memory of 1208 2260 haviz.exe 23 PID 2260 wrote to memory of 1208 2260 haviz.exe 23 PID 2260 wrote to memory of 1208 2260 haviz.exe 23 PID 2260 wrote to memory of 1208 2260 haviz.exe 23 PID 2260 wrote to memory of 1208 2260 haviz.exe 23 PID 2260 wrote to memory of 1964 2260 haviz.exe 30 PID 2260 wrote to memory of 1964 2260 haviz.exe 30 PID 2260 wrote to memory of 1964 2260 haviz.exe 30 PID 2260 wrote to memory of 1964 2260 haviz.exe 30 PID 2260 wrote to memory of 1964 2260 haviz.exe 30 PID 1964 wrote to memory of 2700 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2700 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2700 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2700 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2700 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2700 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2700 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2700 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2700 1964 2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2adf340f8eb4e0b7f88e81fd3e0a8f77_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Roaming\Urofn\haviz.exe"C:\Users\Admin\AppData\Roaming\Urofn\haviz.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp72012bf2.bat"3⤵
- Deletes itself
PID:2700
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5c1edbe54f45df913f6aafececdb97191
SHA1f6c1f24f941a8be1285f7010fd9d887a30961da6
SHA256db42a7f883c407f25283d1fe84775b680276ab24af9bebd041c327c9a3619849
SHA5123c53ec3b73b91098b8528feb1ba791580046e4d3d7ebe11e72a003343feb7e07713494c983d98cf73bfa9cc6c899d24a7d084c1c961f0a25c11f0955938eb020
-
Filesize
312KB
MD58ddbb33b1ad6f36b9ea9656ce62614ee
SHA133e1c4dfb451a3211c5aa0016eae783a5ee931a1
SHA2567e570b46079e98deaed726817dcb5b0a4d2e11dc6a8782120b21f52d627d9fc4
SHA5123d8269ec4f5c039109a5c1a0b62a096709530cc4e7220741d38b5852d80bec09f043a98689d5f9d54c24198066f4d5154e01e7a8c4d6c4e474da6238201b440a