Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 14:48
Static task
static1
Behavioral task
behavioral1
Sample
30cfdf2765dc1be9d12893a0489ffa4a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
30cfdf2765dc1be9d12893a0489ffa4a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
30cfdf2765dc1be9d12893a0489ffa4a_JaffaCakes118.exe
-
Size
138KB
-
MD5
30cfdf2765dc1be9d12893a0489ffa4a
-
SHA1
a333e5f975c623583e11c2958cd53d2aaf7577b9
-
SHA256
10c08643ad2b5459da86df8c171e374fe582bce60333ac8bf2abef29da68ca2c
-
SHA512
fd6361ca8676dce42d6e35c15e5c62b58b4dc4381850be79d80359c6847a07899b05ef2aa3de816e654996f394d2307505448583b3d60be406a6818c21e675f6
-
SSDEEP
3072:/caqyte6sV77snHLLxt0ZyaXOqdPNbnhW4IxZx5kCZuubFrhU1wKKrONmE:/caBty77snHRisY7PNNW4IxZ7zbC0rOf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2120 unli.exe -
Loads dropped DLL 2 IoCs
pid Process 2536 30cfdf2765dc1be9d12893a0489ffa4a_JaffaCakes118.exe 2536 30cfdf2765dc1be9d12893a0489ffa4a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D409BECD-4B92-494B-22B8-958F53D621E5} = "C:\\Users\\Admin\\AppData\\Roaming\\Naxu\\unli.exe" unli.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe 2120 unli.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2536 30cfdf2765dc1be9d12893a0489ffa4a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2120 2536 30cfdf2765dc1be9d12893a0489ffa4a_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2120 2536 30cfdf2765dc1be9d12893a0489ffa4a_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2120 2536 30cfdf2765dc1be9d12893a0489ffa4a_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2120 2536 30cfdf2765dc1be9d12893a0489ffa4a_JaffaCakes118.exe 31 PID 2120 wrote to memory of 1064 2120 unli.exe 17 PID 2120 wrote to memory of 1064 2120 unli.exe 17 PID 2120 wrote to memory of 1064 2120 unli.exe 17 PID 2120 wrote to memory of 1064 2120 unli.exe 17 PID 2120 wrote to memory of 1064 2120 unli.exe 17 PID 2120 wrote to memory of 1092 2120 unli.exe 18 PID 2120 wrote to memory of 1092 2120 unli.exe 18 PID 2120 wrote to memory of 1092 2120 unli.exe 18 PID 2120 wrote to memory of 1092 2120 unli.exe 18 PID 2120 wrote to memory of 1092 2120 unli.exe 18 PID 2120 wrote to memory of 1144 2120 unli.exe 20 PID 2120 wrote to memory of 1144 2120 unli.exe 20 PID 2120 wrote to memory of 1144 2120 unli.exe 20 PID 2120 wrote to memory of 1144 2120 unli.exe 20 PID 2120 wrote to memory of 1144 2120 unli.exe 20 PID 2120 wrote to memory of 924 2120 unli.exe 25 PID 2120 wrote to memory of 924 2120 unli.exe 25 PID 2120 wrote to memory of 924 2120 unli.exe 25 PID 2120 wrote to memory of 924 2120 unli.exe 25 PID 2120 wrote to memory of 924 2120 unli.exe 25 PID 2120 wrote to memory of 2536 2120 unli.exe 29 PID 2120 wrote to memory of 2536 2120 unli.exe 29 PID 2120 wrote to memory of 2536 2120 unli.exe 29 PID 2120 wrote to memory of 2536 2120 unli.exe 29 PID 2120 wrote to memory of 2536 2120 unli.exe 29 PID 2120 wrote to memory of 2228 2120 unli.exe 32 PID 2120 wrote to memory of 2228 2120 unli.exe 32 PID 2120 wrote to memory of 2228 2120 unli.exe 32 PID 2120 wrote to memory of 2228 2120 unli.exe 32 PID 2120 wrote to memory of 2228 2120 unli.exe 32 PID 2120 wrote to memory of 2652 2120 unli.exe 33 PID 2120 wrote to memory of 2652 2120 unli.exe 33 PID 2120 wrote to memory of 2652 2120 unli.exe 33 PID 2120 wrote to memory of 2652 2120 unli.exe 33 PID 2120 wrote to memory of 2652 2120 unli.exe 33 PID 2120 wrote to memory of 1484 2120 unli.exe 34 PID 2120 wrote to memory of 1484 2120 unli.exe 34 PID 2120 wrote to memory of 1484 2120 unli.exe 34 PID 2120 wrote to memory of 1484 2120 unli.exe 34 PID 2120 wrote to memory of 1484 2120 unli.exe 34 PID 2120 wrote to memory of 408 2120 unli.exe 35 PID 2120 wrote to memory of 408 2120 unli.exe 35 PID 2120 wrote to memory of 408 2120 unli.exe 35 PID 2120 wrote to memory of 408 2120 unli.exe 35 PID 2120 wrote to memory of 408 2120 unli.exe 35
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1064
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1092
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\30cfdf2765dc1be9d12893a0489ffa4a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30cfdf2765dc1be9d12893a0489ffa4a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Roaming\Naxu\unli.exe"C:\Users\Admin\AppData\Roaming\Naxu\unli.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:924
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2228
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2652
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1484
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD51be2214a3b75b73d8197f38c84f9430f
SHA1cf45d5c93112b4a2c0b952817ca522b859aa910d
SHA256836f7dcd9dc22e9d456ace560972b424a2e47afff8b4c4142df88f93bea0c630
SHA512a530c490ef8fe88d22fffb0300c61b8b02f4fb8aec14223d02e4a16dc59e62a3f3f02622d2a602c36be97d449ae18200cff304e7f7325e846344b926d0e94b68