Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe
-
Size
138KB
-
MD5
30faa66beaf3fbe941fb827b52248463
-
SHA1
cb12a518127f4310b4e59089a6e9a272d155eaf8
-
SHA256
a75022c9a20ff92e31c85da50b7d450b6136a52bb9758d147f1901386766d39f
-
SHA512
3cd9bc6fc51b177a918ae19d28fbeea26c1032e022f8504aa1e353f970c73bca8caa25b68215c1cabc0d46ee684b19de48539ec2d948c6950aedd8629f56f165
-
SSDEEP
3072:hcAW51Je95KCkkVn1Wx9DZ1UnEiJKxq6uO7v8z3lKIwgrWYi:hcAkWHnE911UnEiX6uOAzomr8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 772 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1564 afyg.exe -
Loads dropped DLL 2 IoCs
pid Process 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\{8DB5F6D9-0EC0-B78D-4FD7-F48A4A78AA90} = "C:\\Users\\Admin\\AppData\\Roaming\\Waohwe\\afyg.exe" afyg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1928 set thread context of 772 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 32 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\29B577EB-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe 1564 afyg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe Token: SeSecurityPrivilege 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe Token: SeSecurityPrivilege 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe Token: SeManageVolumePrivilege 2820 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2820 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2820 WinMail.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1564 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 30 PID 1928 wrote to memory of 1564 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 30 PID 1928 wrote to memory of 1564 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 30 PID 1928 wrote to memory of 1564 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 30 PID 1564 wrote to memory of 1200 1564 afyg.exe 19 PID 1564 wrote to memory of 1200 1564 afyg.exe 19 PID 1564 wrote to memory of 1200 1564 afyg.exe 19 PID 1564 wrote to memory of 1200 1564 afyg.exe 19 PID 1564 wrote to memory of 1200 1564 afyg.exe 19 PID 1564 wrote to memory of 1288 1564 afyg.exe 20 PID 1564 wrote to memory of 1288 1564 afyg.exe 20 PID 1564 wrote to memory of 1288 1564 afyg.exe 20 PID 1564 wrote to memory of 1288 1564 afyg.exe 20 PID 1564 wrote to memory of 1288 1564 afyg.exe 20 PID 1564 wrote to memory of 1340 1564 afyg.exe 21 PID 1564 wrote to memory of 1340 1564 afyg.exe 21 PID 1564 wrote to memory of 1340 1564 afyg.exe 21 PID 1564 wrote to memory of 1340 1564 afyg.exe 21 PID 1564 wrote to memory of 1340 1564 afyg.exe 21 PID 1564 wrote to memory of 1080 1564 afyg.exe 23 PID 1564 wrote to memory of 1080 1564 afyg.exe 23 PID 1564 wrote to memory of 1080 1564 afyg.exe 23 PID 1564 wrote to memory of 1080 1564 afyg.exe 23 PID 1564 wrote to memory of 1080 1564 afyg.exe 23 PID 1564 wrote to memory of 1928 1564 afyg.exe 29 PID 1564 wrote to memory of 1928 1564 afyg.exe 29 PID 1564 wrote to memory of 1928 1564 afyg.exe 29 PID 1564 wrote to memory of 1928 1564 afyg.exe 29 PID 1564 wrote to memory of 1928 1564 afyg.exe 29 PID 1928 wrote to memory of 772 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 32 PID 1928 wrote to memory of 772 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 32 PID 1928 wrote to memory of 772 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 32 PID 1928 wrote to memory of 772 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 32 PID 1928 wrote to memory of 772 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 32 PID 1928 wrote to memory of 772 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 32 PID 1928 wrote to memory of 772 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 32 PID 1928 wrote to memory of 772 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 32 PID 1928 wrote to memory of 772 1928 30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe 32 PID 1564 wrote to memory of 1908 1564 afyg.exe 34 PID 1564 wrote to memory of 1908 1564 afyg.exe 34 PID 1564 wrote to memory of 1908 1564 afyg.exe 34 PID 1564 wrote to memory of 1908 1564 afyg.exe 34 PID 1564 wrote to memory of 1908 1564 afyg.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1200
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1288
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30faa66beaf3fbe941fb827b52248463_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\Waohwe\afyg.exe"C:\Users\Admin\AppData\Roaming\Waohwe\afyg.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1564
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp66fdf034.bat"3⤵
- Deletes itself
PID:772
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1080
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2820
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD53e319c03ef9690fca7d5891441ced55c
SHA1311b44c277e14aa7839142e539eba98119e844af
SHA256307f3699d68aa520b8b4882b425a875f1c902262f1cc54fd380dc6a5e149d6ce
SHA512e96b442566aef6c51c1c3c7a8eecb2dca9d0d7ffe7d58d896b4d5feb445008918d473074eb09c86e83e1514907ce3016fe2c92209c2dff6949b32cb98088c3b9
-
Filesize
271B
MD54600d360603673f6a1e5ac2c06e21266
SHA133901d7d993fffb146d4236d0d412358852be80f
SHA2565b7b8a1b17045e0902d67994c81b25b2f172e9adb9f5d41959e6d10ac9258886
SHA512d9b6a513fc77da8bc5a1dc4eba277a56ee6008b1f0334d86c87051b665f7a1ae566473de49cdc93bed3d497ada6ffdac5c7f6ebd2c0f062fa2b888ed551e524b
-
Filesize
380B
MD524bd5bb59ca7e84a2431e866bdf42d2b
SHA1387d67c68d004afa18032052c1b605cb7b2f5fd2
SHA256f105e8203e330735eea63fd626879bcbd21b6275d93b3123f83886f12a10d7c7
SHA512098845655f0aa73177017ac51ec8c4f2aae0e374d95b4a668f673a0c20efadc3fccc6af43b126e3f7a87814b21701d2c2f44cce6fe2aae889ad200828e9cdfb1
-
Filesize
138KB
MD57fc3accdd3e324a9e8c1ec582bbbd3ef
SHA12ff846d60d5d2de46c2b699b684abb6665bef5f0
SHA2567ff8d7349ed1629937c1d8174355b895924dea49f059b3b21bb02ddc86f4cd33
SHA512f96b532343f897f6aae5d75ade250600e14f61c882207570e30bb764f449f93c730c3d502702237a3b10196bc5a507509696d44d10d43582a73e61d8e5d81980