Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe
-
Size
329KB
-
MD5
32ec9e3b0d8a1b8ebe90010b0198b9b4
-
SHA1
930370a0cbc7ffd83c20b72d707e223c6f9b8248
-
SHA256
0f06690f2a3c5c254608dae656094ff6ff9874b64951db331e6f32a7f88fd0cc
-
SHA512
f824f7e136b5217158cbdea5b176a4dcea9405c7d7501145a455e6320ba014997864aed52288b7f14c28ade7f39eb688734c9852661b37a38b0e603808f181db
-
SSDEEP
6144:rtEn7FUg1iyUXe2ZsD9eBVtQRlc12iVkIFza9TLSDoC3FHvKHMCnv:ra7Fziym920jcc1f929XS335vHk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2936 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2768 siava.exe -
Loads dropped DLL 2 IoCs
pid Process 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C4A05C48-6809-AD4F-9B76-1BFCA18838E1} = "C:\\Users\\Admin\\AppData\\Roaming\\Gegu\\siava.exe" siava.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2388 set thread context of 2936 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe 2768 siava.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 2768 siava.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2768 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2768 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2768 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2768 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 30 PID 2768 wrote to memory of 1036 2768 siava.exe 17 PID 2768 wrote to memory of 1036 2768 siava.exe 17 PID 2768 wrote to memory of 1036 2768 siava.exe 17 PID 2768 wrote to memory of 1036 2768 siava.exe 17 PID 2768 wrote to memory of 1036 2768 siava.exe 17 PID 2768 wrote to memory of 1064 2768 siava.exe 18 PID 2768 wrote to memory of 1064 2768 siava.exe 18 PID 2768 wrote to memory of 1064 2768 siava.exe 18 PID 2768 wrote to memory of 1064 2768 siava.exe 18 PID 2768 wrote to memory of 1064 2768 siava.exe 18 PID 2768 wrote to memory of 1096 2768 siava.exe 20 PID 2768 wrote to memory of 1096 2768 siava.exe 20 PID 2768 wrote to memory of 1096 2768 siava.exe 20 PID 2768 wrote to memory of 1096 2768 siava.exe 20 PID 2768 wrote to memory of 1096 2768 siava.exe 20 PID 2768 wrote to memory of 888 2768 siava.exe 23 PID 2768 wrote to memory of 888 2768 siava.exe 23 PID 2768 wrote to memory of 888 2768 siava.exe 23 PID 2768 wrote to memory of 888 2768 siava.exe 23 PID 2768 wrote to memory of 888 2768 siava.exe 23 PID 2768 wrote to memory of 2388 2768 siava.exe 29 PID 2768 wrote to memory of 2388 2768 siava.exe 29 PID 2768 wrote to memory of 2388 2768 siava.exe 29 PID 2768 wrote to memory of 2388 2768 siava.exe 29 PID 2768 wrote to memory of 2388 2768 siava.exe 29 PID 2388 wrote to memory of 2936 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2936 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2936 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2936 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2936 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2936 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2936 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2936 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2936 2388 32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe 31 PID 2768 wrote to memory of 2072 2768 siava.exe 33 PID 2768 wrote to memory of 2072 2768 siava.exe 33 PID 2768 wrote to memory of 2072 2768 siava.exe 33 PID 2768 wrote to memory of 2072 2768 siava.exe 33 PID 2768 wrote to memory of 2072 2768 siava.exe 33
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1036
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1064
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\32ec9e3b0d8a1b8ebe90010b0198b9b4_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Roaming\Gegu\siava.exe"C:\Users\Admin\AppData\Roaming\Gegu\siava.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2768
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp82f654f8.bat"3⤵
- Deletes itself
PID:2936
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:888
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5b09bd93154b301fd5b999de5da41b774
SHA15a7cd8c53f6bcbb53873c7960fc39aa9a32a9165
SHA256270800e60cdb459cf6dd459373aeee06da545ec76049bc3e7bf50db27cd5823a
SHA5126c55c23557d49f1dadaa771b3a464b723ab5dbc3f506383ab783fd326e3d9649bbdfce5dbeaa4186fabc3be86aa9a36b975219fb32fe0582914a1608ec876a90
-
Filesize
329KB
MD501f67b97029435f69342c0afd9d0109c
SHA1940488db5b02e3f52ba9cc9d14fac39a8cc3f297
SHA2566acf4f6701f2287c930e9c8aeebad5d748ea6694046b7639d9c17c34befff85c
SHA512e815caa0f5ffaf8d7edb774818c18d5cff66e9226580aa9eca3927c8b42c89b6788c2c18efe0090cb362010d1a6101b11d422684ff04c91aa558eddf428050e0