Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe
-
Size
298KB
-
MD5
362b00f54bb4cc3c27ef7b5c07db5754
-
SHA1
427efcfe3f9d156f9495119e4623fb060f4f4c54
-
SHA256
82f5bc70c78522be64c4d3c3f6c9560cea4f126f505c51df570b8f7bba5fe8a1
-
SHA512
7d209bf1cabcd6f0b04899a22d093eacfb17dd514c99f12334f28f6704ea72cb83e1fe4be31e58f1e925479b8d0925b471898c1c63f8efd3ef4ef9d41d4f4db9
-
SSDEEP
6144:F0+N1v3AwzqEybL8eUeiqLnFHXua12BM6SZMIE+YqJ/Crk:aS1AXJ8eXLwo6MC+YqJ/ik
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2844 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1916 fyaxyt.exe -
Loads dropped DLL 1 IoCs
pid Process 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\{15320D28-6FEE-AD4F-3AAA-40C7281D63DA} = "C:\\Users\\Admin\\AppData\\Roaming\\Yxyc\\fyaxyt.exe" fyaxyt.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1976 set thread context of 2844 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Privacy 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe 1916 fyaxyt.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 1916 fyaxyt.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1916 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 30 PID 1976 wrote to memory of 1916 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 30 PID 1976 wrote to memory of 1916 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 30 PID 1976 wrote to memory of 1916 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 30 PID 1916 wrote to memory of 1060 1916 fyaxyt.exe 18 PID 1916 wrote to memory of 1060 1916 fyaxyt.exe 18 PID 1916 wrote to memory of 1060 1916 fyaxyt.exe 18 PID 1916 wrote to memory of 1060 1916 fyaxyt.exe 18 PID 1916 wrote to memory of 1060 1916 fyaxyt.exe 18 PID 1916 wrote to memory of 1124 1916 fyaxyt.exe 19 PID 1916 wrote to memory of 1124 1916 fyaxyt.exe 19 PID 1916 wrote to memory of 1124 1916 fyaxyt.exe 19 PID 1916 wrote to memory of 1124 1916 fyaxyt.exe 19 PID 1916 wrote to memory of 1124 1916 fyaxyt.exe 19 PID 1916 wrote to memory of 1188 1916 fyaxyt.exe 21 PID 1916 wrote to memory of 1188 1916 fyaxyt.exe 21 PID 1916 wrote to memory of 1188 1916 fyaxyt.exe 21 PID 1916 wrote to memory of 1188 1916 fyaxyt.exe 21 PID 1916 wrote to memory of 1188 1916 fyaxyt.exe 21 PID 1916 wrote to memory of 1324 1916 fyaxyt.exe 23 PID 1916 wrote to memory of 1324 1916 fyaxyt.exe 23 PID 1916 wrote to memory of 1324 1916 fyaxyt.exe 23 PID 1916 wrote to memory of 1324 1916 fyaxyt.exe 23 PID 1916 wrote to memory of 1324 1916 fyaxyt.exe 23 PID 1916 wrote to memory of 1976 1916 fyaxyt.exe 29 PID 1916 wrote to memory of 1976 1916 fyaxyt.exe 29 PID 1916 wrote to memory of 1976 1916 fyaxyt.exe 29 PID 1916 wrote to memory of 1976 1916 fyaxyt.exe 29 PID 1916 wrote to memory of 1976 1916 fyaxyt.exe 29 PID 1976 wrote to memory of 2844 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2844 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2844 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2844 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2844 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2844 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2844 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2844 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2844 1976 362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1060
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1124
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\362b00f54bb4cc3c27ef7b5c07db5754_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\Yxyc\fyaxyt.exe"C:\Users\Admin\AppData\Roaming\Yxyc\fyaxyt.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1916
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp48d4c3cd.bat"3⤵
- Deletes itself
PID:2844
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5ca7abfe0290868c35a890983b1c3bcb0
SHA1110ad6eff1f3ee5784da90fad04286273f678f5e
SHA256b8143ef529f0a967494d96fd90fb385bba35d9ec102b93e299bf66afa4a8533b
SHA512e4d6013632a643d2dd92ebed94b0c1e4d29ff75f728ca88283f7a9e355a65072b7928cf2cae42039dad96b46964008004d4f18705f2ba06b830f6708b9133204
-
Filesize
298KB
MD5b805b2f3768dddf8bee984d7a9c28cf4
SHA12d8406fa425f1dad95a4aef284c8e6453019361e
SHA2563a888e8dc4e91e91a7b15c98cad2c462d04ed48864c7bb0d7bdc71d6be5ea7a0
SHA5123f692b7f68ef6bc14954895a7cacbeb1498dfd76befc39a82317618ac7921db1070f003e88601cbbd0e12a94d2cdc34bfa28799a85828218182d7e66d20f5937