Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 11:14
Static task
static1
Behavioral task
behavioral1
Sample
3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe
-
Size
355KB
-
MD5
3d2526007eb44f274a5dabc9911a9262
-
SHA1
86ca9856e309964d54c84a944791ccc149e1062d
-
SHA256
45956c9ec5c57cee435f0b8db09af518ddc72ed060ef3484619f1cb2ca1360c0
-
SHA512
5ef17e63ba12ead2375d7cd38ef19dfd497be4d51939f7133c28cf76313eb9a48d4824f920d1415516f706aa40e3681edb476a38f342dfd71d4ec469b3c34935
-
SSDEEP
6144:EeRXX2S0RbG1f6/LKtkK4A835k/lM+tpcNlBBdUk4OXT:EeRXkLKtkK7IKe8qTvdULOD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2712 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 684 otek.exe 2208 otek.exe -
Loads dropped DLL 2 IoCs
pid Process 2192 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 2192 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\{76E05B48-6E67-AD4F-AEBE-B031A9A3932C} = "C:\\Users\\Admin\\AppData\\Roaming\\Itwuy\\otek.exe" otek.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2328 set thread context of 2192 2328 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 31 PID 684 set thread context of 2208 684 otek.exe 33 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" cmd.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Privacy cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe 2208 otek.exe -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2192 2328 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2192 2328 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2192 2328 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2192 2328 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2192 2328 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2192 2328 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2192 2328 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2192 2328 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2192 2328 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 31 PID 2192 wrote to memory of 684 2192 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 32 PID 2192 wrote to memory of 684 2192 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 32 PID 2192 wrote to memory of 684 2192 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 32 PID 2192 wrote to memory of 684 2192 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 32 PID 684 wrote to memory of 2208 684 otek.exe 33 PID 684 wrote to memory of 2208 684 otek.exe 33 PID 684 wrote to memory of 2208 684 otek.exe 33 PID 684 wrote to memory of 2208 684 otek.exe 33 PID 684 wrote to memory of 2208 684 otek.exe 33 PID 684 wrote to memory of 2208 684 otek.exe 33 PID 684 wrote to memory of 2208 684 otek.exe 33 PID 684 wrote to memory of 2208 684 otek.exe 33 PID 684 wrote to memory of 2208 684 otek.exe 33 PID 2208 wrote to memory of 1120 2208 otek.exe 19 PID 2208 wrote to memory of 1120 2208 otek.exe 19 PID 2208 wrote to memory of 1120 2208 otek.exe 19 PID 2208 wrote to memory of 1120 2208 otek.exe 19 PID 2208 wrote to memory of 1120 2208 otek.exe 19 PID 2208 wrote to memory of 1188 2208 otek.exe 20 PID 2208 wrote to memory of 1188 2208 otek.exe 20 PID 2208 wrote to memory of 1188 2208 otek.exe 20 PID 2208 wrote to memory of 1188 2208 otek.exe 20 PID 2208 wrote to memory of 1188 2208 otek.exe 20 PID 2208 wrote to memory of 1252 2208 otek.exe 21 PID 2208 wrote to memory of 1252 2208 otek.exe 21 PID 2208 wrote to memory of 1252 2208 otek.exe 21 PID 2208 wrote to memory of 1252 2208 otek.exe 21 PID 2208 wrote to memory of 1252 2208 otek.exe 21 PID 2208 wrote to memory of 1404 2208 otek.exe 23 PID 2208 wrote to memory of 1404 2208 otek.exe 23 PID 2208 wrote to memory of 1404 2208 otek.exe 23 PID 2208 wrote to memory of 1404 2208 otek.exe 23 PID 2208 wrote to memory of 1404 2208 otek.exe 23 PID 2208 wrote to memory of 2192 2208 otek.exe 31 PID 2208 wrote to memory of 2192 2208 otek.exe 31 PID 2208 wrote to memory of 2192 2208 otek.exe 31 PID 2208 wrote to memory of 2192 2208 otek.exe 31 PID 2208 wrote to memory of 2192 2208 otek.exe 31 PID 2192 wrote to memory of 2712 2192 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 34 PID 2192 wrote to memory of 2712 2192 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 34 PID 2192 wrote to memory of 2712 2192 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 34 PID 2192 wrote to memory of 2712 2192 3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe 34 PID 2208 wrote to memory of 2712 2208 otek.exe 34 PID 2208 wrote to memory of 2712 2208 otek.exe 34 PID 2208 wrote to memory of 2712 2208 otek.exe 34 PID 2208 wrote to memory of 2712 2208 otek.exe 34 PID 2208 wrote to memory of 2712 2208 otek.exe 34 PID 2208 wrote to memory of 2676 2208 otek.exe 35 PID 2208 wrote to memory of 2676 2208 otek.exe 35 PID 2208 wrote to memory of 2676 2208 otek.exe 35 PID 2208 wrote to memory of 2676 2208 otek.exe 35 PID 2208 wrote to memory of 2676 2208 otek.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Roaming\Itwuy\otek.exe"C:\Users\Admin\AppData\Roaming\Itwuy\otek.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Roaming\Itwuy\otek.exe"C:\Users\Admin\AppData\Roaming\Itwuy\otek.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6d97e890.bat"4⤵
- Deletes itself
- Modifies Internet Explorer settings
PID:2712
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1404
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "5082713491313397904-803951113197499489092586481744558283-1178308413-34452173"1⤵PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD58b98948e7d3b04d3e4416c7328605b89
SHA1dbd3ade0210247af3e78e8ff32c7a515bfdf90a5
SHA256851767ad8ea716a29fd4e74f5fba058c0167575d8c459f1086f91ad7c6f7f3a6
SHA51207b44062c7ffd3450687d8afd74f5e6e6364e8cc6c658fbbeb3925574fe1accbb8a33859d5735ada663d73da5cf549e1d4a5bbc12adc503aee30c7f7a87ba92b
-
Filesize
355KB
MD52de9d678f81ce50174108c264c2f4198
SHA18a70769a4eb31552756f0910b10b9cc36fc7d44f
SHA2563cc84d343cd6d07757ba60f28358881321e30143fc1e87be805ae06e63855ac4
SHA512e78c830f1a6aed54b5770bf1835e7786ec0b7e684be562a4e197d9ec09659168e7815fe94770e7d328744b27e1a172551e85eb03e99e41a02492bb6a433d47f0