Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 09:34
Static task
static1
Behavioral task
behavioral1
Sample
342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe
-
Size
305KB
-
MD5
342bb012cd13db3227b6d525a63850de
-
SHA1
9997bbfc197aeb471ad5cb0932a26cb495cd5e35
-
SHA256
79c21c18aa7d6070e79b51ac91c3b9fae5c373980ac1ef784343e3f45d0ebaae
-
SHA512
3ef5fb6430cc3a9b36db107b572842f1287bf6a8a53a39b6bdda864cb4710f9cd2fd1fdc4303bbaf0c12cdb3aee864b2660f7a587cc0d325cdc4c8fc8bca609d
-
SSDEEP
6144:5GSzaT72Y0SUzinYKTY1SQshfRPVQe1MZkIYSccr7wbstOSPECYeixlYGicW:5Gqu7SSHYsY1UMqMZJYSN7wbstOS8fvg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1144 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2408 ahzeno.exe -
Loads dropped DLL 1 IoCs
pid Process 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\{75DA6328-6F30-AD4F-96DD-2BAD86C808B0} = "C:\\Users\\Admin\\AppData\\Roaming\\Xaelf\\ahzeno.exe" ahzeno.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2400 set thread context of 1144 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe 30 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe 2408 ahzeno.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2408 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2408 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2408 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2408 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe 29 PID 2408 wrote to memory of 1112 2408 ahzeno.exe 18 PID 2408 wrote to memory of 1112 2408 ahzeno.exe 18 PID 2408 wrote to memory of 1112 2408 ahzeno.exe 18 PID 2408 wrote to memory of 1112 2408 ahzeno.exe 18 PID 2408 wrote to memory of 1112 2408 ahzeno.exe 18 PID 2408 wrote to memory of 1156 2408 ahzeno.exe 19 PID 2408 wrote to memory of 1156 2408 ahzeno.exe 19 PID 2408 wrote to memory of 1156 2408 ahzeno.exe 19 PID 2408 wrote to memory of 1156 2408 ahzeno.exe 19 PID 2408 wrote to memory of 1156 2408 ahzeno.exe 19 PID 2408 wrote to memory of 1188 2408 ahzeno.exe 20 PID 2408 wrote to memory of 1188 2408 ahzeno.exe 20 PID 2408 wrote to memory of 1188 2408 ahzeno.exe 20 PID 2408 wrote to memory of 1188 2408 ahzeno.exe 20 PID 2408 wrote to memory of 1188 2408 ahzeno.exe 20 PID 2408 wrote to memory of 1552 2408 ahzeno.exe 24 PID 2408 wrote to memory of 1552 2408 ahzeno.exe 24 PID 2408 wrote to memory of 1552 2408 ahzeno.exe 24 PID 2408 wrote to memory of 1552 2408 ahzeno.exe 24 PID 2408 wrote to memory of 1552 2408 ahzeno.exe 24 PID 2408 wrote to memory of 2400 2408 ahzeno.exe 28 PID 2408 wrote to memory of 2400 2408 ahzeno.exe 28 PID 2408 wrote to memory of 2400 2408 ahzeno.exe 28 PID 2408 wrote to memory of 2400 2408 ahzeno.exe 28 PID 2408 wrote to memory of 2400 2408 ahzeno.exe 28 PID 2400 wrote to memory of 1144 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe 30 PID 2400 wrote to memory of 1144 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe 30 PID 2400 wrote to memory of 1144 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe 30 PID 2400 wrote to memory of 1144 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe 30 PID 2400 wrote to memory of 1144 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe 30 PID 2400 wrote to memory of 1144 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe 30 PID 2400 wrote to memory of 1144 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe 30 PID 2400 wrote to memory of 1144 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe 30 PID 2400 wrote to memory of 1144 2400 342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2644 2408 ahzeno.exe 32 PID 2408 wrote to memory of 2644 2408 ahzeno.exe 32 PID 2408 wrote to memory of 2644 2408 ahzeno.exe 32 PID 2408 wrote to memory of 2644 2408 ahzeno.exe 32 PID 2408 wrote to memory of 2644 2408 ahzeno.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\342bb012cd13db3227b6d525a63850de_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\Xaelf\ahzeno.exe"C:\Users\Admin\AppData\Roaming\Xaelf\ahzeno.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2408
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6fba459b.bat"3⤵
- Deletes itself
PID:1144
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1552
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD554ef7382ac99b662b91aa52a9d1a72e4
SHA14cdfc992920cf6f07e2bff1f3e113d9c4eae8e60
SHA2560fc45cc3a1f4c76008d07f35516a60232f0aa7d1117635b4673f298b277cdf27
SHA512ea772d7aeec050ca512091f44d2e33f1371d46f338f1799fd3463c3593fd176d2fe18d07857c32fc46ef02ca479944d86c28f0d156d007933287279a799f86ce
-
Filesize
305KB
MD500cd5d32631ee947f5aa198ffc32b7e1
SHA1869ba571a834a86841af38786310f04c26222671
SHA2560c40a006e2ac2d3ced86e32166ab379118b7e2c3b10c9a3af4432d787258080d
SHA51221f9d8e401f0bb1ae4d0c604bc794f6ba7a4abcdb8d91f8e81b37cbad193e66f4160f9126f497f36809b50167eaa80ba42bddcccbd1f678d37c81259845e9899