Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe
-
Size
355KB
-
MD5
316064a2f5510c2e10b0312aa4014039
-
SHA1
532bf5273e6ab2431c163734f3db38bc184d1c8f
-
SHA256
72231235248da004a908a8b8449d6bbccadbd084b0e5e557a035daba5092db34
-
SHA512
9420699db8bc312b796de45728c8d58f09ef99aceb108ab1a52d86cc5866f199182af040f694164fbc6ad3f366e1ca4160cd2cb702488b9dcba92a0da5c32872
-
SSDEEP
6144:ZJLwtVGJcKxEz7QYV/hcnAptNU3Rwd+7bqJOkrayVpR:XLAVKEz75/9ptGyCbqJ6yB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2584 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2792 ehoc.exe 2884 ehoc.exe -
Loads dropped DLL 2 IoCs
pid Process 2648 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 2648 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\{36F482E8-6FE9-AD4F-5F98-37194FCB1404} = "C:\\Users\\Admin\\AppData\\Roaming\\Hifew\\ehoc.exe" ehoc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2120 set thread context of 2648 2120 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 31 PID 2792 set thread context of 2884 2792 ehoc.exe 33 -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe 2884 ehoc.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2648 2120 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2648 2120 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2648 2120 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2648 2120 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2648 2120 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2648 2120 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2648 2120 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2648 2120 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2648 2120 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 31 PID 2648 wrote to memory of 2792 2648 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 32 PID 2648 wrote to memory of 2792 2648 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 32 PID 2648 wrote to memory of 2792 2648 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 32 PID 2648 wrote to memory of 2792 2648 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2884 2792 ehoc.exe 33 PID 2792 wrote to memory of 2884 2792 ehoc.exe 33 PID 2792 wrote to memory of 2884 2792 ehoc.exe 33 PID 2792 wrote to memory of 2884 2792 ehoc.exe 33 PID 2792 wrote to memory of 2884 2792 ehoc.exe 33 PID 2792 wrote to memory of 2884 2792 ehoc.exe 33 PID 2792 wrote to memory of 2884 2792 ehoc.exe 33 PID 2792 wrote to memory of 2884 2792 ehoc.exe 33 PID 2792 wrote to memory of 2884 2792 ehoc.exe 33 PID 2648 wrote to memory of 2584 2648 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 34 PID 2648 wrote to memory of 2584 2648 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 34 PID 2648 wrote to memory of 2584 2648 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 34 PID 2648 wrote to memory of 2584 2648 316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe 34 PID 2884 wrote to memory of 1032 2884 ehoc.exe 17 PID 2884 wrote to memory of 1032 2884 ehoc.exe 17 PID 2884 wrote to memory of 1032 2884 ehoc.exe 17 PID 2884 wrote to memory of 1032 2884 ehoc.exe 17 PID 2884 wrote to memory of 1032 2884 ehoc.exe 17 PID 2884 wrote to memory of 1056 2884 ehoc.exe 18 PID 2884 wrote to memory of 1056 2884 ehoc.exe 18 PID 2884 wrote to memory of 1056 2884 ehoc.exe 18 PID 2884 wrote to memory of 1056 2884 ehoc.exe 18 PID 2884 wrote to memory of 1056 2884 ehoc.exe 18 PID 2884 wrote to memory of 1100 2884 ehoc.exe 19 PID 2884 wrote to memory of 1100 2884 ehoc.exe 19 PID 2884 wrote to memory of 1100 2884 ehoc.exe 19 PID 2884 wrote to memory of 1100 2884 ehoc.exe 19 PID 2884 wrote to memory of 1100 2884 ehoc.exe 19 PID 2884 wrote to memory of 1356 2884 ehoc.exe 23 PID 2884 wrote to memory of 1356 2884 ehoc.exe 23 PID 2884 wrote to memory of 1356 2884 ehoc.exe 23 PID 2884 wrote to memory of 1356 2884 ehoc.exe 23 PID 2884 wrote to memory of 1356 2884 ehoc.exe 23
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1032
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\316064a2f5510c2e10b0312aa4014039_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Roaming\Hifew\ehoc.exe"C:\Users\Admin\AppData\Roaming\Hifew\ehoc.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Roaming\Hifew\ehoc.exe"C:\Users\Admin\AppData\Roaming\Hifew\ehoc.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc33e517b.bat"4⤵
- Deletes itself
PID:2584
-
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5830fce90354663b77590c673286ead4d
SHA1d8144ec09a58f1e45e43ee6d316d15e003b9169d
SHA2561ad998a345a88c3023edc821a071347d4c5328bcebcdf6151d7149943949bee6
SHA5128375a02cdc3117e3d32d0c870ca36b945c7f0b6dfac544d174d64bbaa2c26017c179155a307929804906d0851f3bfb323384ea77fc015667fdc5895f92a3144c
-
Filesize
355KB
MD5ed41ad38bee1e8e589df1f1d51df2912
SHA1c24076e0719f17773d62ac123bcbbb6613ce0927
SHA256d51af8ecfadf5f78671f97fc6c3bf6cf2fc6563494a56ba6df79069065515688
SHA5120084544c9449283da4a9c402a622a74ab526637fe27c47f0107007a3197b420a7559a2c12ceb6f80c321bc74f861b6089b7d299fdef55b411c6bcdd433369d9e