Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/07/2024, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe
-
Size
262KB
-
MD5
518c295dd4bc20e300c2bf5fe3bd540a
-
SHA1
845c6ddc19e0dad406a3cd96cb416080d196989d
-
SHA256
aff31cff567948ba4ae2144bbcc562a4d3ab115f7e8b00482414b81ebf40a543
-
SHA512
02ca9a41141c31a205c2f3ea4782d3135910aaa7434dd87a3d8b4866b889873aa00fe5449fea782641a74fd5edc9433303b9e4c7b8f49b0f4997ede7a41f9217
-
SSDEEP
6144:758Gp+df0afmVTRMdwdpn94sLrNXel9ibb98+MAAD:F8YkfXf4TRME94svNuzibb9Z+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1228 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3056 ukle.exe -
Loads dropped DLL 1 IoCs
pid Process 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\{75DA6328-6F30-AD4F-96DD-2BAD86C808B0} = "C:\\Users\\Admin\\AppData\\Roaming\\Putoa\\ukle.exe" ukle.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1292 set thread context of 1228 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe 3056 ukle.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe Token: SeSecurityPrivilege 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe Token: SeSecurityPrivilege 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 3056 ukle.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1292 wrote to memory of 3056 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 30 PID 1292 wrote to memory of 3056 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 30 PID 1292 wrote to memory of 3056 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 30 PID 1292 wrote to memory of 3056 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 30 PID 3056 wrote to memory of 1088 3056 ukle.exe 19 PID 3056 wrote to memory of 1088 3056 ukle.exe 19 PID 3056 wrote to memory of 1088 3056 ukle.exe 19 PID 3056 wrote to memory of 1088 3056 ukle.exe 19 PID 3056 wrote to memory of 1088 3056 ukle.exe 19 PID 3056 wrote to memory of 1144 3056 ukle.exe 20 PID 3056 wrote to memory of 1144 3056 ukle.exe 20 PID 3056 wrote to memory of 1144 3056 ukle.exe 20 PID 3056 wrote to memory of 1144 3056 ukle.exe 20 PID 3056 wrote to memory of 1144 3056 ukle.exe 20 PID 3056 wrote to memory of 1184 3056 ukle.exe 21 PID 3056 wrote to memory of 1184 3056 ukle.exe 21 PID 3056 wrote to memory of 1184 3056 ukle.exe 21 PID 3056 wrote to memory of 1184 3056 ukle.exe 21 PID 3056 wrote to memory of 1184 3056 ukle.exe 21 PID 3056 wrote to memory of 1544 3056 ukle.exe 25 PID 3056 wrote to memory of 1544 3056 ukle.exe 25 PID 3056 wrote to memory of 1544 3056 ukle.exe 25 PID 3056 wrote to memory of 1544 3056 ukle.exe 25 PID 3056 wrote to memory of 1544 3056 ukle.exe 25 PID 3056 wrote to memory of 1292 3056 ukle.exe 29 PID 3056 wrote to memory of 1292 3056 ukle.exe 29 PID 3056 wrote to memory of 1292 3056 ukle.exe 29 PID 3056 wrote to memory of 1292 3056 ukle.exe 29 PID 3056 wrote to memory of 1292 3056 ukle.exe 29 PID 1292 wrote to memory of 1228 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 31 PID 1292 wrote to memory of 1228 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 31 PID 1292 wrote to memory of 1228 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 31 PID 1292 wrote to memory of 1228 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 31 PID 1292 wrote to memory of 1228 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 31 PID 1292 wrote to memory of 1228 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 31 PID 1292 wrote to memory of 1228 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 31 PID 1292 wrote to memory of 1228 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 31 PID 1292 wrote to memory of 1228 1292 518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1088
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1144
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\518c295dd4bc20e300c2bf5fe3bd540a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Roaming\Putoa\ukle.exe"C:\Users\Admin\AppData\Roaming\Putoa\ukle.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2db85440.bat"3⤵
- Deletes itself
PID:1228
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5a6a3a818db3e929bc53c0d20d03ed5cb
SHA114c13a7761a475e2a6bab55a7dff3e55d127f319
SHA256df451b4390b3c8735fd20d2faa25bae4e99858f9f6c0402418baea90140c0a16
SHA512e2c31adf288b4d138635f186d49edec23163f6ef8649f2fab88f478b625322ce30d29347c9c606b25f41c0ccebbe69a6035d64df9aa51cb87d19b8b9f3ac2634
-
Filesize
380B
MD5523a499b2e94966e1330bc1b7d6124f2
SHA16e0ace326722e7ae5989dc42f6579a71cdca50be
SHA256a8a782a7d73f1f5eb89620a5d6949f8e11432fdf01e565cee29b8bf0698cfab0
SHA5126f672f4698cbef77b09a4cb7497120733cd0c688385afca8f46708230a6070183159c8c6e4a0de3a5aa14f7015e896300387705d0d3b153134b2c06115501269
-
Filesize
262KB
MD5c09acefaf6ba0834d880a66dc578df5b
SHA1a5d0e5e4a0dc4e0e65254b4c5d2cb3ff6fd6be2f
SHA256694c0abaae40f8fe1d423de58a29c17c0d7ce8e75b9b2f92857c2739d7733910
SHA512b7c80f18c2fd123b0faa0025e8828e6fb6258eb517b025e45662a7764394ef8cf6bdb716be5766698ef0c90f8c2aaed9527c226d8a15976ea2a8ea8ed83758ca