Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
492412faf7d31541273b0551954fe61b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
492412faf7d31541273b0551954fe61b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
492412faf7d31541273b0551954fe61b_JaffaCakes118.exe
-
Size
305KB
-
MD5
492412faf7d31541273b0551954fe61b
-
SHA1
e52070a22e7ec2a08efd02e1f729fa244dae68a0
-
SHA256
1db1f2507a25c60490566cf36d3711f242a5c0e77dfa491923ce6682d049c196
-
SHA512
7d4ffda25394c3747c6e601b4724b1b2fb5a63dfb85e8badbdd9d37dc47d3a03a243f907e9714baedd36ff50cf3388f46944c8e07d8aa6dd124bc0657a65620d
-
SSDEEP
6144:5GSz1T72Y0SmzinYKTY1SQshfRPVQe1MZkIYSccr7wbstOsPECYeixlYGic2:5Gq57SShYsY1UMqMZJYSN7wbstOs8fvw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2676 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2396 ixojuv.exe -
Loads dropped DLL 1 IoCs
pid Process 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\{1B0C4E28-6E66-AD4F-AB1D-A71BBF328406} = "C:\\Users\\Admin\\AppData\\Roaming\\Vuan\\ixojuv.exe" ixojuv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1964 set thread context of 2676 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe 32 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Privacy 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe 2396 ixojuv.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2396 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2396 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2396 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2396 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe 31 PID 2396 wrote to memory of 1116 2396 ixojuv.exe 19 PID 2396 wrote to memory of 1116 2396 ixojuv.exe 19 PID 2396 wrote to memory of 1116 2396 ixojuv.exe 19 PID 2396 wrote to memory of 1116 2396 ixojuv.exe 19 PID 2396 wrote to memory of 1116 2396 ixojuv.exe 19 PID 2396 wrote to memory of 1176 2396 ixojuv.exe 20 PID 2396 wrote to memory of 1176 2396 ixojuv.exe 20 PID 2396 wrote to memory of 1176 2396 ixojuv.exe 20 PID 2396 wrote to memory of 1176 2396 ixojuv.exe 20 PID 2396 wrote to memory of 1176 2396 ixojuv.exe 20 PID 2396 wrote to memory of 1252 2396 ixojuv.exe 21 PID 2396 wrote to memory of 1252 2396 ixojuv.exe 21 PID 2396 wrote to memory of 1252 2396 ixojuv.exe 21 PID 2396 wrote to memory of 1252 2396 ixojuv.exe 21 PID 2396 wrote to memory of 1252 2396 ixojuv.exe 21 PID 2396 wrote to memory of 1208 2396 ixojuv.exe 23 PID 2396 wrote to memory of 1208 2396 ixojuv.exe 23 PID 2396 wrote to memory of 1208 2396 ixojuv.exe 23 PID 2396 wrote to memory of 1208 2396 ixojuv.exe 23 PID 2396 wrote to memory of 1208 2396 ixojuv.exe 23 PID 2396 wrote to memory of 1964 2396 ixojuv.exe 30 PID 2396 wrote to memory of 1964 2396 ixojuv.exe 30 PID 2396 wrote to memory of 1964 2396 ixojuv.exe 30 PID 2396 wrote to memory of 1964 2396 ixojuv.exe 30 PID 2396 wrote to memory of 1964 2396 ixojuv.exe 30 PID 1964 wrote to memory of 2676 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2676 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2676 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2676 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2676 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2676 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2676 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2676 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2676 1964 492412faf7d31541273b0551954fe61b_JaffaCakes118.exe 32 PID 2396 wrote to memory of 1296 2396 ixojuv.exe 34 PID 2396 wrote to memory of 1296 2396 ixojuv.exe 34 PID 2396 wrote to memory of 1296 2396 ixojuv.exe 34 PID 2396 wrote to memory of 1296 2396 ixojuv.exe 34 PID 2396 wrote to memory of 1296 2396 ixojuv.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\492412faf7d31541273b0551954fe61b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\492412faf7d31541273b0551954fe61b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Roaming\Vuan\ixojuv.exe"C:\Users\Admin\AppData\Roaming\Vuan\ixojuv.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp399e72c7.bat"3⤵
- Deletes itself
PID:2676
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1208
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5f4f560e859bcec08f9af62e397e5aca9
SHA1ac2a8c125f2831091510067289e41e19bd3cbeb5
SHA256c5c823899790d6d5f0f1ac790cd83c996394a0d3af8433636a634a86ad4d16d8
SHA51267910b043e6208e34f2a6aba50a9f7a943929a463ef0f30dab365e6888520ca8c2fb526e6c967ea0543fdbc4604d1cac8fd6ab498dd3b7758ac7ff83c1c28e01
-
Filesize
305KB
MD5e47355323f5072ca54c41eda0158e91c
SHA10e0f04373c6920faa5f683736001be8184a38fc2
SHA256e04a728c82e43db7af3414024cb567d13c5fe014fe674bcb121ccafe9bc14036
SHA512f97df78dbb3a4865a8675b42d9699077127d725262fdff58311862fae7433cda4fbcdb320b31b242ff1e605e8cf345c5c920e5f50223d4f3f7a8f2309c3d671e