Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 21:50
Static task
static1
Behavioral task
behavioral1
Sample
4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe
-
Size
256KB
-
MD5
4b8e2c9c30dec03ab45018d24461f18b
-
SHA1
32b2faa5f1f9e41a8feccb16d819690281a58940
-
SHA256
a06ca1c35c95a074a180b3792600a97776affa028ef128f5a26e699b94634233
-
SHA512
3d8f0f663ba215cd72607265bd639c63314998c0b85643fbdef825ce5c6315566cf01bd354987ee4ba4d1a159b37fd19efe346408235dca509972174a50a1421
-
SSDEEP
6144:eYBkl24UDDr8cAUJ16WH67T54LZ07M4M8NVbyb:nBkSDn8UJk8uTS90oGvbc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2824 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2768 iralr.exe -
Loads dropped DLL 2 IoCs
pid Process 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C6C07C68-68EF-AD4F-3837-F372201AD06F} = "C:\\Users\\Admin\\AppData\\Roaming\\Noyba\\iralr.exe" iralr.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2716 set thread context of 2824 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Privacy 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe 2768 iralr.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 2768 iralr.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2768 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 30 PID 2716 wrote to memory of 2768 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 30 PID 2716 wrote to memory of 2768 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 30 PID 2716 wrote to memory of 2768 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 30 PID 2768 wrote to memory of 1196 2768 iralr.exe 19 PID 2768 wrote to memory of 1196 2768 iralr.exe 19 PID 2768 wrote to memory of 1196 2768 iralr.exe 19 PID 2768 wrote to memory of 1196 2768 iralr.exe 19 PID 2768 wrote to memory of 1196 2768 iralr.exe 19 PID 2768 wrote to memory of 1280 2768 iralr.exe 20 PID 2768 wrote to memory of 1280 2768 iralr.exe 20 PID 2768 wrote to memory of 1280 2768 iralr.exe 20 PID 2768 wrote to memory of 1280 2768 iralr.exe 20 PID 2768 wrote to memory of 1280 2768 iralr.exe 20 PID 2768 wrote to memory of 1324 2768 iralr.exe 21 PID 2768 wrote to memory of 1324 2768 iralr.exe 21 PID 2768 wrote to memory of 1324 2768 iralr.exe 21 PID 2768 wrote to memory of 1324 2768 iralr.exe 21 PID 2768 wrote to memory of 1324 2768 iralr.exe 21 PID 2768 wrote to memory of 1292 2768 iralr.exe 23 PID 2768 wrote to memory of 1292 2768 iralr.exe 23 PID 2768 wrote to memory of 1292 2768 iralr.exe 23 PID 2768 wrote to memory of 1292 2768 iralr.exe 23 PID 2768 wrote to memory of 1292 2768 iralr.exe 23 PID 2768 wrote to memory of 2716 2768 iralr.exe 29 PID 2768 wrote to memory of 2716 2768 iralr.exe 29 PID 2768 wrote to memory of 2716 2768 iralr.exe 29 PID 2768 wrote to memory of 2716 2768 iralr.exe 29 PID 2768 wrote to memory of 2716 2768 iralr.exe 29 PID 2716 wrote to memory of 2824 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2824 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2824 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2824 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2824 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2824 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2824 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2824 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2824 2716 4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1196
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1280
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Roaming\Noyba\iralr.exe"C:\Users\Admin\AppData\Roaming\Noyba\iralr.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2768
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2418b468.bat"3⤵
- Deletes itself
PID:2824
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5cc46b1a85c2c54a6f71363b99daa0c86
SHA17ae230ce178dd82b32b48aa519826755dfb2135f
SHA2568263f4f253e4ff08b97063b7922215987e22434fc8f6d849f4436292cb18cefc
SHA51295f1715c4fa779384e91a6f3eda8f298c92e283aec8c0b283f381cbbb946dfdcece9b04828d59d5eede47aac709f2789ae35841abb31303e8cc4f5a9f10a67b2
-
Filesize
256KB
MD54545376bc6e2abc704adb59bbbc2ab0c
SHA1641e0f0cbbfa841cdd25b3cd45759e05343099a2
SHA256989851b16da60f343ab743e584f39deeab5f76c1ec135071112af00af0b24bfc
SHA512c161ff98d2ba2fc6d8408670bdf75c032a23b0821ad018ae910706ce387b8c484ba4340719d90837552fce79c771e86f1dac8a4c06df9003b86c6849fe7374f1