Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 00:20
Static task
static1
Behavioral task
behavioral1
Sample
5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe
-
Size
298KB
-
MD5
5e4d4c7a75e96dd92eaf1533c45d228b
-
SHA1
4cd4eab1b8257c62012c2bd0d8c338e3b4b06b6d
-
SHA256
3933f86919922655c3838aff299c646d8a85dfe4658ab48b56667e1bfca832f5
-
SHA512
70f57dc419075c1c80011851b4a16fe93ffc98d8382a19c09fed9021f10d2806284f48f699b0fa7fe4ead176a9df465e938efd287b3d16a8e038d3de7d2308fe
-
SSDEEP
6144:R0+N1vzAwzqEybL8eFiqLnFH3ua12BM6SZMIEEYq3/GS:mSpAXJ8evLIo6MCEYq3/H
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3000 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 560 yjbi.exe -
Loads dropped DLL 1 IoCs
pid Process 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\{15320D28-6FEE-AD4F-3AAA-40C7281D63DA} = "C:\\Users\\Admin\\AppData\\Roaming\\Duyj\\yjbi.exe" yjbi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 3000 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Privacy 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe 560 yjbi.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 560 yjbi.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1700 wrote to memory of 560 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 30 PID 1700 wrote to memory of 560 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 30 PID 1700 wrote to memory of 560 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 30 PID 1700 wrote to memory of 560 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 30 PID 560 wrote to memory of 1108 560 yjbi.exe 19 PID 560 wrote to memory of 1108 560 yjbi.exe 19 PID 560 wrote to memory of 1108 560 yjbi.exe 19 PID 560 wrote to memory of 1108 560 yjbi.exe 19 PID 560 wrote to memory of 1108 560 yjbi.exe 19 PID 560 wrote to memory of 1156 560 yjbi.exe 20 PID 560 wrote to memory of 1156 560 yjbi.exe 20 PID 560 wrote to memory of 1156 560 yjbi.exe 20 PID 560 wrote to memory of 1156 560 yjbi.exe 20 PID 560 wrote to memory of 1156 560 yjbi.exe 20 PID 560 wrote to memory of 1188 560 yjbi.exe 21 PID 560 wrote to memory of 1188 560 yjbi.exe 21 PID 560 wrote to memory of 1188 560 yjbi.exe 21 PID 560 wrote to memory of 1188 560 yjbi.exe 21 PID 560 wrote to memory of 1188 560 yjbi.exe 21 PID 560 wrote to memory of 1552 560 yjbi.exe 25 PID 560 wrote to memory of 1552 560 yjbi.exe 25 PID 560 wrote to memory of 1552 560 yjbi.exe 25 PID 560 wrote to memory of 1552 560 yjbi.exe 25 PID 560 wrote to memory of 1552 560 yjbi.exe 25 PID 560 wrote to memory of 1700 560 yjbi.exe 29 PID 560 wrote to memory of 1700 560 yjbi.exe 29 PID 560 wrote to memory of 1700 560 yjbi.exe 29 PID 560 wrote to memory of 1700 560 yjbi.exe 29 PID 560 wrote to memory of 1700 560 yjbi.exe 29 PID 1700 wrote to memory of 3000 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 31 PID 1700 wrote to memory of 3000 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 31 PID 1700 wrote to memory of 3000 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 31 PID 1700 wrote to memory of 3000 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 31 PID 1700 wrote to memory of 3000 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 31 PID 1700 wrote to memory of 3000 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 31 PID 1700 wrote to memory of 3000 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 31 PID 1700 wrote to memory of 3000 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 31 PID 1700 wrote to memory of 3000 1700 5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e4d4c7a75e96dd92eaf1533c45d228b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\Duyj\yjbi.exe"C:\Users\Admin\AppData\Roaming\Duyj\yjbi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:560
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp538108af.bat"3⤵
- Deletes itself
PID:3000
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD58e529553a51d25cd2ab2ac534c304edd
SHA19b657367106e2656e57998a6bd36c978927aa402
SHA25672ac6d9b141717101af4d994c98801930eb06e12b10fa96f9d1981f998eb521f
SHA512553a4687eae52aab6d9fb0dd7ee814f8be15aafe6cb51ff224cdc5dd510f0d52367909487787d3cd7d5999441d591d2ac26bc24292ef0872e56eada52804c2fd
-
Filesize
298KB
MD588854d12827213c3ef6661246fcdcdfd
SHA12c4ed3ba65345f988dafb2962aa1df9bcedf8fe4
SHA25601afc69aaa86934b3aa855db2b324cb3234a3506c8cc17bbc934ed7093c41218
SHA512b8d43e22245c2b82080a6d57089264dc2555099d77c947343df18db0fc98248a5dd068a7e72acbf8a8ab28f93d5a9483bf2f40cdac5afa4cf83cb48a8b65ad12