Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 20:13
Behavioral task
behavioral1
Sample
363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe
-
Size
198KB
-
MD5
363665717e4296b0ca7ffb81bee7fe4c
-
SHA1
508a48df71aa5158f2f81c2d46e9f78f585265c3
-
SHA256
86cc871113cb0f6c1cc5bcff87fee3f58f394337fccac0640786e75d62d56759
-
SHA512
3453bd46c2ed166bc8d93101f470c6b10bfc12124fc063082581fd40ca4fd938af1b99f7823458c4ec8346859e3babeb83175d4b36174ccdd1236ee4bc48ceb2
-
SSDEEP
3072:LaKCpSo7DDHEIHV4J3ZjSdNCattpC1tUxn+7j4j3U4mnNsglJZoDMKpQWDaAFlET:GdlXGMBVC1tUxn+fUHg9KDrFli+J
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1616 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2320 woomypu.exe -
Loads dropped DLL 2 IoCs
pid Process 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2624-0-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/files/0x0007000000019623-5.dat upx behavioral1/memory/2320-13-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2624-12-0x00000000004B0000-0x00000000004F5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\{FF9F8FC6-A500-CF70-63FC-FC610414A138} = "C:\\Users\\Admin\\AppData\\Roaming\\Ofudsy\\woomypu.exe" woomypu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2624 set thread context of 1616 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 33 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7987539E-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe 2320 woomypu.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe Token: SeSecurityPrivilege 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe Token: SeSecurityPrivilege 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe Token: SeManageVolumePrivilege 1060 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1060 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1060 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1060 WinMail.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2320 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 31 PID 2624 wrote to memory of 2320 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 31 PID 2624 wrote to memory of 2320 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 31 PID 2624 wrote to memory of 2320 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 31 PID 2320 wrote to memory of 1108 2320 woomypu.exe 19 PID 2320 wrote to memory of 1108 2320 woomypu.exe 19 PID 2320 wrote to memory of 1108 2320 woomypu.exe 19 PID 2320 wrote to memory of 1108 2320 woomypu.exe 19 PID 2320 wrote to memory of 1108 2320 woomypu.exe 19 PID 2320 wrote to memory of 1172 2320 woomypu.exe 20 PID 2320 wrote to memory of 1172 2320 woomypu.exe 20 PID 2320 wrote to memory of 1172 2320 woomypu.exe 20 PID 2320 wrote to memory of 1172 2320 woomypu.exe 20 PID 2320 wrote to memory of 1172 2320 woomypu.exe 20 PID 2320 wrote to memory of 1220 2320 woomypu.exe 21 PID 2320 wrote to memory of 1220 2320 woomypu.exe 21 PID 2320 wrote to memory of 1220 2320 woomypu.exe 21 PID 2320 wrote to memory of 1220 2320 woomypu.exe 21 PID 2320 wrote to memory of 1220 2320 woomypu.exe 21 PID 2320 wrote to memory of 1920 2320 woomypu.exe 25 PID 2320 wrote to memory of 1920 2320 woomypu.exe 25 PID 2320 wrote to memory of 1920 2320 woomypu.exe 25 PID 2320 wrote to memory of 1920 2320 woomypu.exe 25 PID 2320 wrote to memory of 1920 2320 woomypu.exe 25 PID 2320 wrote to memory of 2624 2320 woomypu.exe 30 PID 2320 wrote to memory of 2624 2320 woomypu.exe 30 PID 2320 wrote to memory of 2624 2320 woomypu.exe 30 PID 2320 wrote to memory of 2624 2320 woomypu.exe 30 PID 2320 wrote to memory of 2624 2320 woomypu.exe 30 PID 2624 wrote to memory of 1616 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 33 PID 2624 wrote to memory of 1616 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 33 PID 2624 wrote to memory of 1616 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 33 PID 2624 wrote to memory of 1616 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 33 PID 2624 wrote to memory of 1616 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 33 PID 2624 wrote to memory of 1616 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 33 PID 2624 wrote to memory of 1616 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 33 PID 2624 wrote to memory of 1616 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 33 PID 2624 wrote to memory of 1616 2624 363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe 33 PID 2320 wrote to memory of 2896 2320 woomypu.exe 35 PID 2320 wrote to memory of 2896 2320 woomypu.exe 35 PID 2320 wrote to memory of 2896 2320 woomypu.exe 35 PID 2320 wrote to memory of 2896 2320 woomypu.exe 35 PID 2320 wrote to memory of 2896 2320 woomypu.exe 35 PID 2320 wrote to memory of 2368 2320 woomypu.exe 36 PID 2320 wrote to memory of 2368 2320 woomypu.exe 36 PID 2320 wrote to memory of 2368 2320 woomypu.exe 36 PID 2320 wrote to memory of 2368 2320 woomypu.exe 36 PID 2320 wrote to memory of 2368 2320 woomypu.exe 36
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\363665717e4296b0ca7ffb81bee7fe4c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Roaming\Ofudsy\woomypu.exe"C:\Users\Admin\AppData\Roaming\Ofudsy\woomypu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2320
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp1a4dfcdb.bat"3⤵
- Deletes itself
PID:1616
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1920
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1060
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2896
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD51efb91cd5cdc419f9d27e82d9400c111
SHA15c331eeec2df3b3c37ae141c78590a555d66cbfd
SHA256f3036922c3e7e46dbb2a8cc3e661577f05898d4ec29dccbf7f52716ec26476d4
SHA512474c81dd647cc38e84ba9060c3e01d55becb1a6bbdab45952614ffd31933cc172544e23b125884a4187a9ec74c321dfc4fe67c3ff7f2af52b78257b3a1676681
-
Filesize
271B
MD5cb47e4eb9b7ee5744557b2f02f1d3010
SHA15d75116ac61cf77c02c26ce8b85f8878b93d1fad
SHA25679c43cece285f6f9c6e0e3c509ad9bc1e37af7cad3fdc6982040ec88f7be0cb3
SHA5127a5df040d18804a4cdc2c00ba0bdbc25d5275e54042425173a960c03afabe414fa9a83dd0286bc185274cfcf2301f6afb7527d70f4986eb987c9b52d61b3c840
-
Filesize
380B
MD5ae9cd82948fa7e64d6992dbc9cdbcebc
SHA1be70ca25bbffe30e9a479886e675d90665a3918f
SHA2568771fccc1e96834b57348adc4fbb0bc2f635f368a4308ed9c2b33a9118152d6c
SHA5126e2ae9ebb6dae594405d36da02ee482d0e6b9d3e02aa7348d6713a42e11fa1e57eb71b39085a317514f1ffc8ab5af622f873029ce183ad13e2906ccc9621eea2
-
Filesize
198KB
MD59aa519c2b0d420d358a51a30a8e17c36
SHA1471f5cb39fe30c04a93c7d1d8e3c92bcafb9dbd9
SHA256c1c85f0e7f33d85bcd1850668f6fd9cf318609d11cbd66c7fe98f4957a922bfb
SHA5122b17dbfa46bbdb7259f58127b0d675837f872c38fb128cd5587d5b36018fac172e1750e58395cb1b5bc21f14108a55b418e4298cee66967565aefede3cdff67d