Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 09:35
Static task
static1
Behavioral task
behavioral1
Sample
3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe
-
Size
364KB
-
MD5
3896858b1863281410edb6c0f9a853a1
-
SHA1
cfa451bc441fd648da21d3c4483e05983013e24e
-
SHA256
d0034e007be4e84999566a52934d064fa9896650529e01c55e63080b64e30eb7
-
SHA512
6649e9e4468a08f4f8d73bc4caf6560622933ba1a8b560ca0bed78293bcf395919115038496cb7beb1639b87d4f679da7472c62940e4c351e73b2b5c065def4e
-
SSDEEP
6144:bbCdh2yzFFgIX0zE9NKFEWNFfK4CS0NwI32+fFBFFrkiHw:bmdAWgIXxcXNkjN3Zf1Frjw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1092 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1216 goolje.exe -
Loads dropped DLL 2 IoCs
pid Process 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\{278F5008-6814-AD4F-E8EF-460FE6556512} = "C:\\Users\\Admin\\AppData\\Roaming\\Umix\\goolje.exe" goolje.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1540 set thread context of 1092 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Privacy 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe 1216 goolje.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 1216 goolje.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1216 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 30 PID 1540 wrote to memory of 1216 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 30 PID 1540 wrote to memory of 1216 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 30 PID 1540 wrote to memory of 1216 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 30 PID 1216 wrote to memory of 1104 1216 goolje.exe 19 PID 1216 wrote to memory of 1104 1216 goolje.exe 19 PID 1216 wrote to memory of 1104 1216 goolje.exe 19 PID 1216 wrote to memory of 1104 1216 goolje.exe 19 PID 1216 wrote to memory of 1104 1216 goolje.exe 19 PID 1216 wrote to memory of 1168 1216 goolje.exe 20 PID 1216 wrote to memory of 1168 1216 goolje.exe 20 PID 1216 wrote to memory of 1168 1216 goolje.exe 20 PID 1216 wrote to memory of 1168 1216 goolje.exe 20 PID 1216 wrote to memory of 1168 1216 goolje.exe 20 PID 1216 wrote to memory of 1220 1216 goolje.exe 21 PID 1216 wrote to memory of 1220 1216 goolje.exe 21 PID 1216 wrote to memory of 1220 1216 goolje.exe 21 PID 1216 wrote to memory of 1220 1216 goolje.exe 21 PID 1216 wrote to memory of 1220 1216 goolje.exe 21 PID 1216 wrote to memory of 1656 1216 goolje.exe 25 PID 1216 wrote to memory of 1656 1216 goolje.exe 25 PID 1216 wrote to memory of 1656 1216 goolje.exe 25 PID 1216 wrote to memory of 1656 1216 goolje.exe 25 PID 1216 wrote to memory of 1656 1216 goolje.exe 25 PID 1216 wrote to memory of 1540 1216 goolje.exe 29 PID 1216 wrote to memory of 1540 1216 goolje.exe 29 PID 1216 wrote to memory of 1540 1216 goolje.exe 29 PID 1216 wrote to memory of 1540 1216 goolje.exe 29 PID 1216 wrote to memory of 1540 1216 goolje.exe 29 PID 1540 wrote to memory of 1092 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 31 PID 1540 wrote to memory of 1092 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 31 PID 1540 wrote to memory of 1092 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 31 PID 1540 wrote to memory of 1092 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 31 PID 1540 wrote to memory of 1092 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 31 PID 1540 wrote to memory of 1092 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 31 PID 1540 wrote to memory of 1092 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 31 PID 1540 wrote to memory of 1092 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 31 PID 1540 wrote to memory of 1092 1540 3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe 31 PID 1216 wrote to memory of 2792 1216 goolje.exe 34 PID 1216 wrote to memory of 2792 1216 goolje.exe 34 PID 1216 wrote to memory of 2792 1216 goolje.exe 34 PID 1216 wrote to memory of 2792 1216 goolje.exe 34 PID 1216 wrote to memory of 2792 1216 goolje.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3896858b1863281410edb6c0f9a853a1_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Roaming\Umix\goolje.exe"C:\Users\Admin\AppData\Roaming\Umix\goolje.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp71c68b3d.bat"3⤵
- Deletes itself
PID:1092
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1656
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5efc1402bfca4a002f20104d25c5eca1c
SHA1bc8e2d266689f602bc290a510999c398609e0086
SHA256d12433c2e527ed31c5fca7be42117eabd8456b06d7056ce6cd1b912f73830f0c
SHA512b0a731f205f26c0a830cf5a2c72162240540d866fafe293ae7d461158a44d6c93d7a02931ea88bc95c00417d2dedcc6a4e34065f1da63bdb5d834d7927ae7754
-
Filesize
364KB
MD5ffc8a381291b5503a95a20bd9549e01b
SHA1657c97ca6fe579c39c76af92076645130cfb32d0
SHA256c2927ce98ab6836ba6aaabb3f17ff302f355a901d0a1e8b5150857cc6a328ad6
SHA512c2091a03eae03481fd99aa465cacea061672d21561e7db3f33b04a2390a9d96a7bd4c21942bd8940a4a3ac66615df3e69da8d450a5eae7a2fc289b6aa0895141