Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe
-
Size
254KB
-
MD5
6315b3bde2f9c4f4f20c43ce0c9100c7
-
SHA1
362c5f747b32631834fa284f0972211cb22101a4
-
SHA256
856cb94672286d55c3a80cc715bc0cc70bcf6048e8e866bb2d06d57a86e03061
-
SHA512
583eb22ced77b19b6ba48c50badb794de5c64268ab29dfe192f0d99861cb2a5fb34f701ba3b2216b0e9d62f7997ff4b6b5f9449ab40ff8e95793824f92f9f29b
-
SSDEEP
6144:kR3S2aGoaW84vazVVYC0caMEL1wM1VHKa/vz:kRiUoaHfIhwqVfL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2640 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 996 hiuqj.exe -
Loads dropped DLL 2 IoCs
pid Process 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\{09E0E5E8-6808-AD4F-43B0-714965AC5254} = "C:\\Users\\Admin\\AppData\\Roaming\\Qioc\\hiuqj.exe" hiuqj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1048 set thread context of 2640 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Privacy 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe 996 hiuqj.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 996 hiuqj.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1048 wrote to memory of 996 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 29 PID 1048 wrote to memory of 996 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 29 PID 1048 wrote to memory of 996 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 29 PID 1048 wrote to memory of 996 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 29 PID 996 wrote to memory of 1112 996 hiuqj.exe 18 PID 996 wrote to memory of 1112 996 hiuqj.exe 18 PID 996 wrote to memory of 1112 996 hiuqj.exe 18 PID 996 wrote to memory of 1112 996 hiuqj.exe 18 PID 996 wrote to memory of 1112 996 hiuqj.exe 18 PID 996 wrote to memory of 1180 996 hiuqj.exe 19 PID 996 wrote to memory of 1180 996 hiuqj.exe 19 PID 996 wrote to memory of 1180 996 hiuqj.exe 19 PID 996 wrote to memory of 1180 996 hiuqj.exe 19 PID 996 wrote to memory of 1180 996 hiuqj.exe 19 PID 996 wrote to memory of 1208 996 hiuqj.exe 20 PID 996 wrote to memory of 1208 996 hiuqj.exe 20 PID 996 wrote to memory of 1208 996 hiuqj.exe 20 PID 996 wrote to memory of 1208 996 hiuqj.exe 20 PID 996 wrote to memory of 1208 996 hiuqj.exe 20 PID 996 wrote to memory of 1688 996 hiuqj.exe 24 PID 996 wrote to memory of 1688 996 hiuqj.exe 24 PID 996 wrote to memory of 1688 996 hiuqj.exe 24 PID 996 wrote to memory of 1688 996 hiuqj.exe 24 PID 996 wrote to memory of 1688 996 hiuqj.exe 24 PID 996 wrote to memory of 1048 996 hiuqj.exe 28 PID 996 wrote to memory of 1048 996 hiuqj.exe 28 PID 996 wrote to memory of 1048 996 hiuqj.exe 28 PID 996 wrote to memory of 1048 996 hiuqj.exe 28 PID 996 wrote to memory of 1048 996 hiuqj.exe 28 PID 1048 wrote to memory of 2640 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 30 PID 1048 wrote to memory of 2640 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 30 PID 1048 wrote to memory of 2640 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 30 PID 1048 wrote to memory of 2640 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 30 PID 1048 wrote to memory of 2640 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 30 PID 1048 wrote to memory of 2640 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 30 PID 1048 wrote to memory of 2640 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 30 PID 1048 wrote to memory of 2640 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 30 PID 1048 wrote to memory of 2640 1048 6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe 30
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Roaming\Qioc\hiuqj.exe"C:\Users\Admin\AppData\Roaming\Qioc\hiuqj.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp29878517.bat"3⤵
- Deletes itself
PID:2640
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5186dedcf8f0d271df7429e782e524853
SHA18ccdbdb7c69099a061b0197eebb1935f6b485b1f
SHA2560edd5ee47e50540a9659fc3ecc599fe56ecc6ac714408a09d3b3621e8b1f8b37
SHA5126fee5d0666a36949c9d2255608f878e89204d2765b450da9b95c198b08ae1c87bc51ceade0c9edf53b8318d70b64fd226e97a0c0b5a20c2ae22e4b9c15c6722c
-
Filesize
254KB
MD53ee0a2dd9ecd3ef9e856066eab322997
SHA1529eb748d59315484fc34f98aa40aad346618631
SHA256094a1ed73ec34a34384ab4399281f233bdbe829e641080387f2e033863cb2565
SHA51263341aae9891565579db57c625a86199e2434edf26ec06e4a3eafcd80a5898c28d545a64f6fe041490ef11c59861bc4cba73af88bda3e4e70624bdae12b7fdf2