Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 21:59
Behavioral task
behavioral1
Sample
438121c72fed1f020a1fd216f9dd7806_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
438121c72fed1f020a1fd216f9dd7806_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
438121c72fed1f020a1fd216f9dd7806_JaffaCakes118.exe
-
Size
490KB
-
MD5
438121c72fed1f020a1fd216f9dd7806
-
SHA1
fe392e8f5ba50ff4fd9704056e52d06e4e21c074
-
SHA256
a5defc75f6530072504b03d4fd6b3ed5d0ea02aab9efdc74d2e28af58353bfc1
-
SHA512
baeef3cfdfdf3695ecd675c6b18713874865a94e24b2b3db8581470d9e7aa242c0d351fc2334562451fad2f90c6a4c12a35ac80bcca7874cae87e1a85c0faf9d
-
SSDEEP
6144:6xGIi+Q5RBvHyBnk3o83xbNlMEnFqbFuk+4xoFltJ:PdmnkRlMkFqpukhav
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2264 Tqoxua.exe -
resource yara_rule behavioral1/memory/2376-0-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/files/0x000700000001722b-11.dat upx behavioral1/memory/2264-13-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2376-12-0x00000000022E0000-0x000000000235C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\18RH6WMFH2 = "C:\\Windows\\Tqoxua.exe" Tqoxua.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 438121c72fed1f020a1fd216f9dd7806_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 438121c72fed1f020a1fd216f9dd7806_JaffaCakes118.exe File created C:\Windows\Tqoxua.exe 438121c72fed1f020a1fd216f9dd7806_JaffaCakes118.exe File opened for modification C:\Windows\Tqoxua.exe 438121c72fed1f020a1fd216f9dd7806_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main Tqoxua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe 2264 Tqoxua.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2376 438121c72fed1f020a1fd216f9dd7806_JaffaCakes118.exe 2264 Tqoxua.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2264 2376 438121c72fed1f020a1fd216f9dd7806_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2264 2376 438121c72fed1f020a1fd216f9dd7806_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2264 2376 438121c72fed1f020a1fd216f9dd7806_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2264 2376 438121c72fed1f020a1fd216f9dd7806_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\438121c72fed1f020a1fd216f9dd7806_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\438121c72fed1f020a1fd216f9dd7806_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\Tqoxua.exeC:\Windows\Tqoxua.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372B
MD5c17a4955fd61fb6e7f163a5456530cb0
SHA1c6cba7a60a6acd1e89fe0807038e1f8d168a865f
SHA25699484eaa636317330cb2c987b1346736f378baeed8e5f0f7ffc648168efd40e1
SHA512d0c3a93dab255526ff1f9fbf627c803ce885ff2d23c38383f694fe49122c6707c9158675624fc54ec69ab7a2e9370744041a1f267539e96e330da493518e7e2f
-
Filesize
490KB
MD5438121c72fed1f020a1fd216f9dd7806
SHA1fe392e8f5ba50ff4fd9704056e52d06e4e21c074
SHA256a5defc75f6530072504b03d4fd6b3ed5d0ea02aab9efdc74d2e28af58353bfc1
SHA512baeef3cfdfdf3695ecd675c6b18713874865a94e24b2b3db8581470d9e7aa242c0d351fc2334562451fad2f90c6a4c12a35ac80bcca7874cae87e1a85c0faf9d