Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 01:09
Behavioral task
behavioral1
Sample
658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe
-
Size
190KB
-
MD5
658c5f7965bb14ab173f4aba4c9447d1
-
SHA1
b31b65a349d3da3f521d53f7d7d72cbaed7e22f0
-
SHA256
1088225ffa3168c21105c7898c6f9baaf291929d96278f3d5de02e6524b16604
-
SHA512
0d7685da027f188f8f2a32ae319e453910ddaca39354ae6d6b867c1cf96ec84b2fc513ec672164205bf311114f63e52f5b7da8cd5736c712648542efbf2318cd
-
SSDEEP
3072:mIDmuWr4LdvNopW2tiTqVhNm3Z6B+KlaLwdTy0M85jFQeR6ncIoVLlVIAGBFeDUu:mudvNopv8afgDLwduq5RywLlVIAGBFej
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3004 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2784 goquy.exe -
Loads dropped DLL 2 IoCs
pid Process 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2720-8-0x0000000000400000-0x00000000007D6000-memory.dmp upx behavioral1/files/0x0009000000016141-6.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\{15320D28-6FEE-AD4F-3AAA-40C7281D63DA} = "C:\\Users\\Admin\\AppData\\Roaming\\Odda\\goquy.exe" goquy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2720 set thread context of 3004 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Privacy 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe 2784 goquy.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe Token: SeSecurityPrivilege 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe Token: SeSecurityPrivilege 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2784 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2784 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2784 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2784 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 30 PID 2784 wrote to memory of 1108 2784 goquy.exe 19 PID 2784 wrote to memory of 1108 2784 goquy.exe 19 PID 2784 wrote to memory of 1108 2784 goquy.exe 19 PID 2784 wrote to memory of 1108 2784 goquy.exe 19 PID 2784 wrote to memory of 1108 2784 goquy.exe 19 PID 2784 wrote to memory of 1172 2784 goquy.exe 20 PID 2784 wrote to memory of 1172 2784 goquy.exe 20 PID 2784 wrote to memory of 1172 2784 goquy.exe 20 PID 2784 wrote to memory of 1172 2784 goquy.exe 20 PID 2784 wrote to memory of 1172 2784 goquy.exe 20 PID 2784 wrote to memory of 1204 2784 goquy.exe 21 PID 2784 wrote to memory of 1204 2784 goquy.exe 21 PID 2784 wrote to memory of 1204 2784 goquy.exe 21 PID 2784 wrote to memory of 1204 2784 goquy.exe 21 PID 2784 wrote to memory of 1204 2784 goquy.exe 21 PID 2784 wrote to memory of 2016 2784 goquy.exe 23 PID 2784 wrote to memory of 2016 2784 goquy.exe 23 PID 2784 wrote to memory of 2016 2784 goquy.exe 23 PID 2784 wrote to memory of 2016 2784 goquy.exe 23 PID 2784 wrote to memory of 2016 2784 goquy.exe 23 PID 2784 wrote to memory of 2720 2784 goquy.exe 29 PID 2784 wrote to memory of 2720 2784 goquy.exe 29 PID 2784 wrote to memory of 2720 2784 goquy.exe 29 PID 2784 wrote to memory of 2720 2784 goquy.exe 29 PID 2784 wrote to memory of 2720 2784 goquy.exe 29 PID 2720 wrote to memory of 3004 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 31 PID 2720 wrote to memory of 3004 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 31 PID 2720 wrote to memory of 3004 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 31 PID 2720 wrote to memory of 3004 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 31 PID 2720 wrote to memory of 3004 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 31 PID 2720 wrote to memory of 3004 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 31 PID 2720 wrote to memory of 3004 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 31 PID 2720 wrote to memory of 3004 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 31 PID 2720 wrote to memory of 3004 2720 658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\658c5f7965bb14ab173f4aba4c9447d1_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Roaming\Odda\goquy.exe"C:\Users\Admin\AppData\Roaming\Odda\goquy.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpb1b1afd0.bat"3⤵
- Deletes itself
PID:3004
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD592721547502820df8c46b9a2e37d6161
SHA19979c95ffe290b9e89b78f7e00e4859002a60c6e
SHA2566a32c0be874b3a8b86173a0dc1a0ffa66826f3def09c57355ddeba842b7a8b63
SHA5127e5cb32faf6eac2c617ae7d7a15de7278133c7f97b04dd7612920d41175df6d6bc4a70cfd480eb632d10fb0acca5c654f6f984cc25538d4540264da66ad20c21
-
Filesize
380B
MD57fd00f1528db382240aa84d0413a69c9
SHA14f556d978adc985b44fdf1dc0d000912b11a1edd
SHA256d7e1e7c9ac1e8418841c9b96cdd47f344e345ea78e58cdcd300e2ba240f40a26
SHA512760234e4de3dff6bf5fb643c2f17ac95a8f793efa0eb100e9ae88d9b6840edba6636614292078c6d93d3a306d47709593a5f69125f6d14589814ecbb3965a11f
-
Filesize
190KB
MD5a1d16f1aa1598f18428e35c1eda07fb3
SHA1a76c8ade056340aed629c6398f0ca5ac60a2a2ea
SHA25635f91de7d565e163bf84ddd7f2a998cc9cb98786a54969f0a44a788abd675b42
SHA51292d7fb2c7342e498efa2d41d2d999a453fc9597bb530eaeafa46bbf8ba6fbb4b062727463159571066ee975de4d4e949be5709df1a7367ca11af27961af9fda1