Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe
-
Size
312KB
-
MD5
59f3f897b00fe1b7bafc58a9d2bcf8ad
-
SHA1
79970d311d3c9a5065a851794610284613ff9c51
-
SHA256
e0a6ddcac1713fad1a48d1ad27e40412b07381534c019e88b1374a35d4f621a6
-
SHA512
110f1d0f944502f25f1de1278b9579656845c20a220978e15c7d44e2c14418ac77df91a019a9a089b418d8cdd9487afb91c82e009807c615f7b481bded4f27c3
-
SSDEEP
6144:4yBIuBlo8ACyd1dUhAE74jvaG66xegV+/mJC63W7P+tN1JB50Kb:4CcdjaUq6QgV+OvSPG175vb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2852 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 xexy.exe -
Loads dropped DLL 2 IoCs
pid Process 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\{15320D28-6FEE-AD4F-3AAA-40C7281D63DA} = "C:\\Users\\Admin\\AppData\\Roaming\\Sioma\\xexy.exe" xexy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3060 set thread context of 2852 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Privacy 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe 3008 xexy.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 3008 xexy.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3060 wrote to memory of 3008 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 30 PID 3060 wrote to memory of 3008 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 30 PID 3060 wrote to memory of 3008 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 30 PID 3060 wrote to memory of 3008 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 30 PID 3008 wrote to memory of 1108 3008 xexy.exe 19 PID 3008 wrote to memory of 1108 3008 xexy.exe 19 PID 3008 wrote to memory of 1108 3008 xexy.exe 19 PID 3008 wrote to memory of 1108 3008 xexy.exe 19 PID 3008 wrote to memory of 1108 3008 xexy.exe 19 PID 3008 wrote to memory of 1176 3008 xexy.exe 20 PID 3008 wrote to memory of 1176 3008 xexy.exe 20 PID 3008 wrote to memory of 1176 3008 xexy.exe 20 PID 3008 wrote to memory of 1176 3008 xexy.exe 20 PID 3008 wrote to memory of 1176 3008 xexy.exe 20 PID 3008 wrote to memory of 1200 3008 xexy.exe 21 PID 3008 wrote to memory of 1200 3008 xexy.exe 21 PID 3008 wrote to memory of 1200 3008 xexy.exe 21 PID 3008 wrote to memory of 1200 3008 xexy.exe 21 PID 3008 wrote to memory of 1200 3008 xexy.exe 21 PID 3008 wrote to memory of 552 3008 xexy.exe 25 PID 3008 wrote to memory of 552 3008 xexy.exe 25 PID 3008 wrote to memory of 552 3008 xexy.exe 25 PID 3008 wrote to memory of 552 3008 xexy.exe 25 PID 3008 wrote to memory of 552 3008 xexy.exe 25 PID 3008 wrote to memory of 3060 3008 xexy.exe 29 PID 3008 wrote to memory of 3060 3008 xexy.exe 29 PID 3008 wrote to memory of 3060 3008 xexy.exe 29 PID 3008 wrote to memory of 3060 3008 xexy.exe 29 PID 3008 wrote to memory of 3060 3008 xexy.exe 29 PID 3060 wrote to memory of 2852 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 31 PID 3060 wrote to memory of 2852 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 31 PID 3060 wrote to memory of 2852 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 31 PID 3060 wrote to memory of 2852 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 31 PID 3060 wrote to memory of 2852 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 31 PID 3060 wrote to memory of 2852 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 31 PID 3060 wrote to memory of 2852 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 31 PID 3060 wrote to memory of 2852 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 31 PID 3060 wrote to memory of 2852 3060 59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Roaming\Sioma\xexy.exe"C:\Users\Admin\AppData\Roaming\Sioma\xexy.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3008
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpeefa7e65.bat"3⤵
- Deletes itself
PID:2852
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD56c988f91975be7f8f58d5dbd1181966d
SHA10937f43a461f3d2e9daedfed32b3b05c6a4aecfa
SHA25616182493093a548b654aac5731f16226b70f7edcdcb108ff7e02c520801c9801
SHA512c073cf45bd21fffe65bb7637f58167057427aaae1faf037bb015caab482932ca9d8f660eb5475a2f615cd41d07713ca78d26747b00b9947907a08ad964a53f2d
-
Filesize
312KB
MD5a213f9bf689b46bc55c5c9584b856f4a
SHA1b009643f670000d292ca6cd0cc311b48093fa103
SHA256b6eeac882cea5e70eeae3acb99757a23829978f67a96c4c3b10d3c6b4c344e2d
SHA512e46b20f4c9aebe734ba65f347932058aa10571022b90732f3496bd6a2f7f19b4f8139974b094a5ef95a97696e25d2f9917e1bf3e74a79fe012ad8b401303ee6a