Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe
-
Size
174KB
-
MD5
37e360bc659f2c392604cd8be5298e87
-
SHA1
45a3b841ad520f1901479ab41ca2ace34b4dcaf7
-
SHA256
cedccdc60e3274be00187b8bb7cc33c8fb9e244f09b4822bbd2c64dc6f1a9c63
-
SHA512
593dfac216471ace7af9972de0046101e910b0ca3d89a61c825dff1c0da71d6a339d0730d499748786d4db69bb8cba22a3e7366443a68b36eaef1ccf3cd6b891
-
SSDEEP
3072:W0s00T8LBb3NIGbVcnk4TGIS1nvxONJdvdxUHe8kroN7TbLFh6Pqg1EDvoDU:jszT8t7bcZ1SRxOhMeJO7XLbwqKEDvoY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1216 emivd.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Xiysm = "C:\\Users\\Admin\\AppData\\Roaming\\Usizu\\emivd.exe" emivd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3040 set thread context of 2372 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 33 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\64A738B0-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe 1216 emivd.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 1216 emivd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeSecurityPrivilege 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe Token: SeSecurityPrivilege 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe Token: SeSecurityPrivilege 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe Token: SeSecurityPrivilege 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe Token: SeSecurityPrivilege 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe Token: SeSecurityPrivilege 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe Token: SeSecurityPrivilege 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe Token: SeSecurityPrivilege 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe Token: SeManageVolumePrivilege 296 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 296 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 296 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 296 WinMail.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3040 wrote to memory of 1216 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 31 PID 3040 wrote to memory of 1216 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 31 PID 3040 wrote to memory of 1216 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 31 PID 3040 wrote to memory of 1216 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 31 PID 1216 wrote to memory of 1108 1216 emivd.exe 19 PID 1216 wrote to memory of 1108 1216 emivd.exe 19 PID 1216 wrote to memory of 1108 1216 emivd.exe 19 PID 1216 wrote to memory of 1108 1216 emivd.exe 19 PID 1216 wrote to memory of 1108 1216 emivd.exe 19 PID 1216 wrote to memory of 1172 1216 emivd.exe 20 PID 1216 wrote to memory of 1172 1216 emivd.exe 20 PID 1216 wrote to memory of 1172 1216 emivd.exe 20 PID 1216 wrote to memory of 1172 1216 emivd.exe 20 PID 1216 wrote to memory of 1172 1216 emivd.exe 20 PID 1216 wrote to memory of 1220 1216 emivd.exe 21 PID 1216 wrote to memory of 1220 1216 emivd.exe 21 PID 1216 wrote to memory of 1220 1216 emivd.exe 21 PID 1216 wrote to memory of 1220 1216 emivd.exe 21 PID 1216 wrote to memory of 1220 1216 emivd.exe 21 PID 1216 wrote to memory of 1920 1216 emivd.exe 25 PID 1216 wrote to memory of 1920 1216 emivd.exe 25 PID 1216 wrote to memory of 1920 1216 emivd.exe 25 PID 1216 wrote to memory of 1920 1216 emivd.exe 25 PID 1216 wrote to memory of 1920 1216 emivd.exe 25 PID 1216 wrote to memory of 3040 1216 emivd.exe 30 PID 1216 wrote to memory of 3040 1216 emivd.exe 30 PID 1216 wrote to memory of 3040 1216 emivd.exe 30 PID 1216 wrote to memory of 3040 1216 emivd.exe 30 PID 1216 wrote to memory of 3040 1216 emivd.exe 30 PID 3040 wrote to memory of 2372 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 33 PID 3040 wrote to memory of 2372 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 33 PID 3040 wrote to memory of 2372 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 33 PID 3040 wrote to memory of 2372 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 33 PID 3040 wrote to memory of 2372 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 33 PID 3040 wrote to memory of 2372 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 33 PID 3040 wrote to memory of 2372 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 33 PID 3040 wrote to memory of 2372 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 33 PID 3040 wrote to memory of 2372 3040 37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe 33 PID 1216 wrote to memory of 2780 1216 emivd.exe 35 PID 1216 wrote to memory of 2780 1216 emivd.exe 35 PID 1216 wrote to memory of 2780 1216 emivd.exe 35 PID 1216 wrote to memory of 2780 1216 emivd.exe 35 PID 1216 wrote to memory of 2780 1216 emivd.exe 35 PID 1216 wrote to memory of 1156 1216 emivd.exe 36 PID 1216 wrote to memory of 1156 1216 emivd.exe 36 PID 1216 wrote to memory of 1156 1216 emivd.exe 36 PID 1216 wrote to memory of 1156 1216 emivd.exe 36 PID 1216 wrote to memory of 1156 1216 emivd.exe 36
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37e360bc659f2c392604cd8be5298e87_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Roaming\Usizu\emivd.exe"C:\Users\Admin\AppData\Roaming\Usizu\emivd.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp853150e3.bat"3⤵PID:2372
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1920
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:296
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2780
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5ed3a2f57520f8b6103ab06ce419c190a
SHA11d7c2eb083af802c31162100b0e42a33079a49c5
SHA2568019d92bb141a4d5faeedc8b84950f10345efce20c11e64d8756cb052d65d491
SHA512089aac8c1d9f7b4050c2c93572deb135ee5df0455faa6c0f1d2126cf45bbbe47b60f63294d66db9b567a0be64005a2194c0cf17b2ea0175efc513e707c8624f7
-
Filesize
4KB
MD5e981bd95e6383af56bfc7adb65bf7939
SHA19a380a2429ee0b5a76558625e78a3728f145a3ce
SHA2562bfefbb739ca91e190b8209db40738e0fb65924d67b300548d0125d167b91102
SHA5128cd48d579700bb84c83585fc2c5e2777f955c7632e5cf73b57be640eab8bfa9063cef0cea59e564a588f1c51f1f0cb52d45e32c2be2a8b53849440a5f6f387bd
-
Filesize
174KB
MD50b0d1a71ce9462d89f8d70c0f140dc7f
SHA15517170d9015bbc4bbca0d17b8d7990123b82772
SHA256937febe39fea6e84cea004dd82ef40ba78ce6cb7680e059ae86014da414433fc
SHA512cc0804bfc426d6c797e0021be201e5811402a556a3166e457d9a79e8032ca6f57d8a2c816380cf9359fbf683d2bac98bf7a3480ca485d3fc2fd8be3875dfd114