Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 13:45
Static task
static1
Behavioral task
behavioral1
Sample
4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe
-
Size
293KB
-
MD5
4e93205ab202f5e3f637a6babbc5bd1e
-
SHA1
78dbc5730e69dbbcb14e1e73762647430a7bd555
-
SHA256
3119a59dc13e0fbc43b15b6321ac115c0098de4abcdd2d68367f1174c158ec33
-
SHA512
8e02d6e88f07eb853588d73ef7c51ca861796824bcae0107bc5f48a0985cc63afee53b9d30f327bcc43cdac090ecbe56e65015c2a6eb8942cfd49ba672e85e56
-
SSDEEP
6144:XPdMYMANEVzGlcEDUl4qaRYVQxJTGbusJRhgnGXcTD7Xm2BeddhMHXoH/:5NEh8cSLqdasisDhgnGsBBedDM3of
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2452 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2880 zeid.exe -
Loads dropped DLL 2 IoCs
pid Process 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C6C07C68-68EF-AD4F-3837-F372201AD06F} = "C:\\Users\\Admin\\AppData\\Roaming\\Bigaja\\zeid.exe" zeid.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2324 set thread context of 2452 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Privacy 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe 2880 zeid.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe Token: SeSecurityPrivilege 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe Token: SeSecurityPrivilege 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 2880 zeid.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2880 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 28 PID 2324 wrote to memory of 2880 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 28 PID 2324 wrote to memory of 2880 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 28 PID 2324 wrote to memory of 2880 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 28 PID 2880 wrote to memory of 1116 2880 zeid.exe 19 PID 2880 wrote to memory of 1116 2880 zeid.exe 19 PID 2880 wrote to memory of 1116 2880 zeid.exe 19 PID 2880 wrote to memory of 1116 2880 zeid.exe 19 PID 2880 wrote to memory of 1116 2880 zeid.exe 19 PID 2880 wrote to memory of 1188 2880 zeid.exe 20 PID 2880 wrote to memory of 1188 2880 zeid.exe 20 PID 2880 wrote to memory of 1188 2880 zeid.exe 20 PID 2880 wrote to memory of 1188 2880 zeid.exe 20 PID 2880 wrote to memory of 1188 2880 zeid.exe 20 PID 2880 wrote to memory of 1248 2880 zeid.exe 21 PID 2880 wrote to memory of 1248 2880 zeid.exe 21 PID 2880 wrote to memory of 1248 2880 zeid.exe 21 PID 2880 wrote to memory of 1248 2880 zeid.exe 21 PID 2880 wrote to memory of 1248 2880 zeid.exe 21 PID 2880 wrote to memory of 624 2880 zeid.exe 23 PID 2880 wrote to memory of 624 2880 zeid.exe 23 PID 2880 wrote to memory of 624 2880 zeid.exe 23 PID 2880 wrote to memory of 624 2880 zeid.exe 23 PID 2880 wrote to memory of 624 2880 zeid.exe 23 PID 2880 wrote to memory of 2324 2880 zeid.exe 27 PID 2880 wrote to memory of 2324 2880 zeid.exe 27 PID 2880 wrote to memory of 2324 2880 zeid.exe 27 PID 2880 wrote to memory of 2324 2880 zeid.exe 27 PID 2880 wrote to memory of 2324 2880 zeid.exe 27 PID 2324 wrote to memory of 2452 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 29 PID 2324 wrote to memory of 2452 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 29 PID 2324 wrote to memory of 2452 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 29 PID 2324 wrote to memory of 2452 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 29 PID 2324 wrote to memory of 2452 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 29 PID 2324 wrote to memory of 2452 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 29 PID 2324 wrote to memory of 2452 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 29 PID 2324 wrote to memory of 2452 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 29 PID 2324 wrote to memory of 2452 2324 4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Roaming\Bigaja\zeid.exe"C:\Users\Admin\AppData\Roaming\Bigaja\zeid.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2880
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp847b583d.bat"3⤵
- Deletes itself
PID:2452
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5311040082a0bf64d843b13b637a33cf4
SHA121ab6c5d224d0e0631f730becf25df633f36c8f8
SHA256435eccab202fa39b8769345786345833fa4bb3a3a8117121191a95331bcbea42
SHA512be25a714f8659104361db723a7682d1b80ac05576da1d3871c210e4f588d9a7e875fcb45718539e3c11795c2b1d363e6f5bcc152791460092d1a2969643d463f
-
Filesize
380B
MD55b1d970d84e350e6714144d91df494dd
SHA14ece192c593120cb518a43b76c0d2e899b5a111f
SHA256040f92d7afb43b496b14a9578fd1b61dde3458bec0ecd2ec53c499971c99b444
SHA51257b8330d466981144860d3d381e7ddc2c2e967dc4ebe81085dd14cd6103cd2aaff07c1cbe7df28ead9a045d180a66db23b9774f78592b616c7216f990298fe4d
-
Filesize
293KB
MD5bb2478c16e50ec04f07a36df979fc41a
SHA1dbdce05598583c301912093bee3eb12efc98062b
SHA25637bf7980dc8c3e53e813560d7e2a695052fbe4c4b5a88d099e78a95297c5ef67
SHA512841a69ebc18dd69f29368867f0d942c681a53323335876d07c22398b2b6f7d5c18b38d63e432fd84967942f98b44ac705175c17012c7945d90ae4b2acb14dcc2