Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 10:31
Static task
static1
Behavioral task
behavioral1
Sample
49660e17835b10091fe60697d0674c00_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
49660e17835b10091fe60697d0674c00_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
49660e17835b10091fe60697d0674c00_JaffaCakes118.exe
-
Size
284KB
-
MD5
49660e17835b10091fe60697d0674c00
-
SHA1
a8e298bf05aba4ddfb6941c9d6a34c80dd25329a
-
SHA256
0289fc4fce80c9ed77f8bbd0a997ad9447dda268bd4a438d739283a73cf4aa4f
-
SHA512
b95149172e39e93b0eb718b94676b0224ecd6182df9c756f0691fc33c9d73f6e9ccfc80b43e46768ae6e73ff45a9f6e259eac5b53b503567f1225ce289eaaf48
-
SSDEEP
6144:DNq6AU17HPwmDDANk9eAMezB8Tu4+4lAGK9gGSwDoc6m:DM6AU17HB19Z3Lgm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2812 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2964 luoq.exe -
Loads dropped DLL 2 IoCs
pid Process 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\{76E05B48-6E67-AD4F-AEBE-B031A9A3932C} = "C:\\Users\\Admin\\AppData\\Roaming\\Baebuk\\luoq.exe" luoq.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2564 set thread context of 2812 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Privacy 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe 2964 luoq.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe Token: SeSecurityPrivilege 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe Token: SeSecurityPrivilege 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 2964 luoq.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2964 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 28 PID 2564 wrote to memory of 2964 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 28 PID 2564 wrote to memory of 2964 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 28 PID 2564 wrote to memory of 2964 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 28 PID 2964 wrote to memory of 1104 2964 luoq.exe 19 PID 2964 wrote to memory of 1104 2964 luoq.exe 19 PID 2964 wrote to memory of 1104 2964 luoq.exe 19 PID 2964 wrote to memory of 1104 2964 luoq.exe 19 PID 2964 wrote to memory of 1104 2964 luoq.exe 19 PID 2964 wrote to memory of 1184 2964 luoq.exe 20 PID 2964 wrote to memory of 1184 2964 luoq.exe 20 PID 2964 wrote to memory of 1184 2964 luoq.exe 20 PID 2964 wrote to memory of 1184 2964 luoq.exe 20 PID 2964 wrote to memory of 1184 2964 luoq.exe 20 PID 2964 wrote to memory of 1236 2964 luoq.exe 21 PID 2964 wrote to memory of 1236 2964 luoq.exe 21 PID 2964 wrote to memory of 1236 2964 luoq.exe 21 PID 2964 wrote to memory of 1236 2964 luoq.exe 21 PID 2964 wrote to memory of 1236 2964 luoq.exe 21 PID 2964 wrote to memory of 1668 2964 luoq.exe 23 PID 2964 wrote to memory of 1668 2964 luoq.exe 23 PID 2964 wrote to memory of 1668 2964 luoq.exe 23 PID 2964 wrote to memory of 1668 2964 luoq.exe 23 PID 2964 wrote to memory of 1668 2964 luoq.exe 23 PID 2964 wrote to memory of 2564 2964 luoq.exe 27 PID 2964 wrote to memory of 2564 2964 luoq.exe 27 PID 2964 wrote to memory of 2564 2964 luoq.exe 27 PID 2964 wrote to memory of 2564 2964 luoq.exe 27 PID 2964 wrote to memory of 2564 2964 luoq.exe 27 PID 2564 wrote to memory of 2812 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2812 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2812 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2812 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2812 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2812 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2812 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2812 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2812 2564 49660e17835b10091fe60697d0674c00_JaffaCakes118.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\49660e17835b10091fe60697d0674c00_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\49660e17835b10091fe60697d0674c00_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Roaming\Baebuk\luoq.exe"C:\Users\Admin\AppData\Roaming\Baebuk\luoq.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2964
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf28cef28.bat"3⤵
- Deletes itself
PID:2812
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5b8aa39a749bc43aa6e5616512762df83
SHA15b7bc587a818d3cd9a381560d8016cccabcf6b74
SHA256ae4281d1f5a818bc7232cd270a8cd656b05987122d09b9490b1f131c4abc7abb
SHA51226df454943e4f9d29952f0b17d84ad19b9bb0a312369cb99df59e3be807f6caf90e8bf5a8ab27a3ea655ae80cd140d0c6fed71088286d47477d91c03bc7c77ae
-
Filesize
380B
MD5f6b3953b3c5bd1b85ecbab3ea8c619ae
SHA177865e8dd5b2e3a94708f05d2523314c2b0155f8
SHA256a84a409bddecddfc74914953ebb1ba64439e2a4ceb89da2352c3594d49c0c7f2
SHA5126a02f49c9a6cac9c946495d5d0730d985553cb1d1aa22fbf6044fc4bca3092fffa1d0a1710bb531d6045942483160ad67deccc7fe7589c60a888a39fbc4b021b
-
Filesize
284KB
MD50f39a36ba1baf7271013ebb6e0da6438
SHA1d11887f754c749245a3578848e7cd756297d5556
SHA256b4eb61442316140e35f4f3746aaf82b20665e808599572b232feb52fd19c621a
SHA512ae982a249e6e67ea60a9fc7e83a11b77f0ced4277ca6954efdb5a1cd54ae0bd6e3ba3d8dfd8c783cc641c6208e84bb2d1edbb70096e140ed63350f76579aa1c2