Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe
-
Size
296KB
-
MD5
3bb711149502c3a0f3193224cdb2bfa6
-
SHA1
63f156ffe9fcbeb22484421cd2ae3b77a70d44cf
-
SHA256
40d28e7b5cc9d6e07d4ed5b51d8f00ffaa4a1fb9a0066be4d7809fcb265e4986
-
SHA512
9c1fd4f41599338152403bbf536172c545bcd50ede6bba99d7a69c05d04c693d4f02b8514c044cf17b0545a9bab7218f68e3955958f0316fbe206df12ca868d6
-
SSDEEP
6144:Wq96LzpTw0jTHwOZDoxX55mC7e+ySRIJrcyTft:yX1/THx2X5YzpSRIJrLjt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1984 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2396 ihviyq.exe -
Loads dropped DLL 1 IoCs
pid Process 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\{09E0E5E8-6808-AD4F-43B0-714965AC5254} = "C:\\Users\\Admin\\AppData\\Roaming\\Geaj\\ihviyq.exe" ihviyq.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1992 set thread context of 1984 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Privacy 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe 2396 ihviyq.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 2396 ihviyq.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2396 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2396 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2396 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2396 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1112 2396 ihviyq.exe 19 PID 2396 wrote to memory of 1112 2396 ihviyq.exe 19 PID 2396 wrote to memory of 1112 2396 ihviyq.exe 19 PID 2396 wrote to memory of 1112 2396 ihviyq.exe 19 PID 2396 wrote to memory of 1112 2396 ihviyq.exe 19 PID 2396 wrote to memory of 1176 2396 ihviyq.exe 20 PID 2396 wrote to memory of 1176 2396 ihviyq.exe 20 PID 2396 wrote to memory of 1176 2396 ihviyq.exe 20 PID 2396 wrote to memory of 1176 2396 ihviyq.exe 20 PID 2396 wrote to memory of 1176 2396 ihviyq.exe 20 PID 2396 wrote to memory of 1212 2396 ihviyq.exe 21 PID 2396 wrote to memory of 1212 2396 ihviyq.exe 21 PID 2396 wrote to memory of 1212 2396 ihviyq.exe 21 PID 2396 wrote to memory of 1212 2396 ihviyq.exe 21 PID 2396 wrote to memory of 1212 2396 ihviyq.exe 21 PID 2396 wrote to memory of 1520 2396 ihviyq.exe 23 PID 2396 wrote to memory of 1520 2396 ihviyq.exe 23 PID 2396 wrote to memory of 1520 2396 ihviyq.exe 23 PID 2396 wrote to memory of 1520 2396 ihviyq.exe 23 PID 2396 wrote to memory of 1520 2396 ihviyq.exe 23 PID 2396 wrote to memory of 1992 2396 ihviyq.exe 29 PID 2396 wrote to memory of 1992 2396 ihviyq.exe 29 PID 2396 wrote to memory of 1992 2396 ihviyq.exe 29 PID 2396 wrote to memory of 1992 2396 ihviyq.exe 29 PID 2396 wrote to memory of 1992 2396 ihviyq.exe 29 PID 1992 wrote to memory of 1984 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 31 PID 1992 wrote to memory of 1984 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 31 PID 1992 wrote to memory of 1984 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 31 PID 1992 wrote to memory of 1984 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 31 PID 1992 wrote to memory of 1984 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 31 PID 1992 wrote to memory of 1984 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 31 PID 1992 wrote to memory of 1984 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 31 PID 1992 wrote to memory of 1984 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 31 PID 1992 wrote to memory of 1984 1992 3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Roaming\Geaj\ihviyq.exe"C:\Users\Admin\AppData\Roaming\Geaj\ihviyq.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2396
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7f5d87d8.bat"3⤵
- Deletes itself
PID:1984
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD58702df8f77864381e95a77712c39c317
SHA12cd0b18ac20d8dfc908f4e78d8638cda6fb1a02f
SHA25655494e93bc567985269d8bd6ed09201cfb467e51744ff0772acbe2d06d447545
SHA512628ef05970ee072901a192b307143e2718662ef7f7150886db2913e75f049d7bb7440c492020e47203b3a7add9487234a4691ae0da7b87dde358fc6dcbd34d80
-
Filesize
296KB
MD5282e57afcb21d64ce43586968fda0df5
SHA134ff527e3ca0e432a8753a240ced11ea2ea75700
SHA25641e86b9e45551306f2087fdc5f9da03e4867ecf170518f0407127f7264e2227b
SHA512545ef766faa2accc2c00806579ea1e2a1b06891e1b5206e8f89dc04c52c8b87ff88b78e0065d32b3642711a7927aa697143bc7225c0d7214c124d2f3cc384235