Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe
-
Size
276KB
-
MD5
5d756b5f9c2253aee95a568e4e1c34f5
-
SHA1
938f359ed14012f27905f152ee4b837d62a44b6e
-
SHA256
bb354dd642ee7520fd3f17b676531ce959e48d38dbb37303d0db363b5545e578
-
SHA512
cce6d3ad80226ed1d36f06681b5d9f275c51851c00e1f4b57c4441a3fd91a30f941bcb9927961daf98f1cd11f6551c1d2c4db2704b46d1fa4f99198987e88399
-
SSDEEP
6144:RXKFVTW9rUSUa4klU2SC9IZTNkyBr0i51eQwJAvsuA6X:RXKFV+rUSCqUFCeNkyBt1e9AvE0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1084 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2724 buqe.exe -
Loads dropped DLL 2 IoCs
pid Process 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\{75DA6328-6F30-AD4F-96DD-2BAD86C808B0} = "C:\\Users\\Admin\\AppData\\Roaming\\Qior\\buqe.exe" buqe.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1944 set thread context of 1084 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe 2724 buqe.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe Token: SeSecurityPrivilege 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe Token: SeSecurityPrivilege 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 2724 buqe.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2724 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 29 PID 1944 wrote to memory of 2724 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 29 PID 1944 wrote to memory of 2724 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 29 PID 1944 wrote to memory of 2724 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 29 PID 2724 wrote to memory of 1232 2724 buqe.exe 18 PID 2724 wrote to memory of 1232 2724 buqe.exe 18 PID 2724 wrote to memory of 1232 2724 buqe.exe 18 PID 2724 wrote to memory of 1232 2724 buqe.exe 18 PID 2724 wrote to memory of 1232 2724 buqe.exe 18 PID 2724 wrote to memory of 1328 2724 buqe.exe 19 PID 2724 wrote to memory of 1328 2724 buqe.exe 19 PID 2724 wrote to memory of 1328 2724 buqe.exe 19 PID 2724 wrote to memory of 1328 2724 buqe.exe 19 PID 2724 wrote to memory of 1328 2724 buqe.exe 19 PID 2724 wrote to memory of 1384 2724 buqe.exe 20 PID 2724 wrote to memory of 1384 2724 buqe.exe 20 PID 2724 wrote to memory of 1384 2724 buqe.exe 20 PID 2724 wrote to memory of 1384 2724 buqe.exe 20 PID 2724 wrote to memory of 1384 2724 buqe.exe 20 PID 2724 wrote to memory of 1240 2724 buqe.exe 22 PID 2724 wrote to memory of 1240 2724 buqe.exe 22 PID 2724 wrote to memory of 1240 2724 buqe.exe 22 PID 2724 wrote to memory of 1240 2724 buqe.exe 22 PID 2724 wrote to memory of 1240 2724 buqe.exe 22 PID 2724 wrote to memory of 1944 2724 buqe.exe 28 PID 2724 wrote to memory of 1944 2724 buqe.exe 28 PID 2724 wrote to memory of 1944 2724 buqe.exe 28 PID 2724 wrote to memory of 1944 2724 buqe.exe 28 PID 2724 wrote to memory of 1944 2724 buqe.exe 28 PID 1944 wrote to memory of 1084 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 30 PID 1944 wrote to memory of 1084 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 30 PID 1944 wrote to memory of 1084 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 30 PID 1944 wrote to memory of 1084 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 30 PID 1944 wrote to memory of 1084 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 30 PID 1944 wrote to memory of 1084 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 30 PID 1944 wrote to memory of 1084 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 30 PID 1944 wrote to memory of 1084 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 30 PID 1944 wrote to memory of 1084 1944 5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe 30
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1232
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1328
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d756b5f9c2253aee95a568e4e1c34f5_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\Qior\buqe.exe"C:\Users\Admin\AppData\Roaming\Qior\buqe.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2724
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp4c7d1b0e.bat"3⤵
- Deletes itself
PID:1084
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5f200039f77b28b314a5e8b7cbc41c55b
SHA1b1efce5dafed6436f25f6beec6f92b27d86ec7ed
SHA256501a9f85f258098b96f32b97cd676148adde106d57ed546897a8d2d62b893d0e
SHA512570ec7e0707bb64e01b476c22514bb95a2c0dd0453c59b1d5bd456bcbdb8112fcd8b9c7b439b992089e5a4df57b40475772f0bfc1a2279efa536903ddbb5d6c9
-
Filesize
380B
MD532758cc2668bb285114d34162ad7cca0
SHA10d664b489b103ffff2d09678e0116aad7c303b81
SHA256a00a1d0592009c80e8038b36ea97a80fdd0e11aa9c2b0a7ecf7f4a9ddb58dd1d
SHA512b3023bd9ec66ec52df2ca6174f8b5ff8191b5a0162c5e511b0d6a5f278510d56c8ce0b2f5b08533cf9baf385d63ae56b1b8b33855f656471ee24e5b99ac3a0a3
-
Filesize
276KB
MD50cd35124b5e6ded93c1e2f9effcf3069
SHA12dbb0a8cfe83e6b713a1bb5c74966fd01b8a52f5
SHA256eddebdd1afa93a206bff18da673736ffb099206aae4e929c5d394bdc890861fd
SHA512b566272bdb89510d9fbeefa8cb1d4729491c4a347c978978488bf3c28ab6525e053e58adc4ba490d7dd1229640c927b042bfcc8ab852c90d3a9d6bb2795d967d