Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 01:02
Behavioral task
behavioral1
Sample
69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe
-
Size
190KB
-
MD5
69ab8189fff089a9d24ad5fe2cfeaa73
-
SHA1
627a27e550bbbb3525414cca8ae5c3acf5f24cf9
-
SHA256
6cdfa81124d94811e0907a07c6551959ef9864595b730c1c35c14901c9d66036
-
SHA512
e301935ea42966fbca8c6f53fdd697a53972698c7dcd106d1d25e91dd35af69837441897a19a9d5f576a71b282762840960822b6d2635dbd5e616ed3a189d499
-
SSDEEP
3072:/FKEUhm9IpsrEbP3WLK7Xd2DYW8p8/63pwo2PiIIUIBnVTolDUS9NKu:/FyyIqrqWLKjsD96VaIBNADUS9p
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2832 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2368 zyys.exe -
Loads dropped DLL 2 IoCs
pid Process 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1872-0-0x0000000000400000-0x00000000007D6000-memory.dmp upx behavioral1/files/0x0009000000016aa4-6.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C4A05C48-6809-AD4F-9B76-1BFCA18838E1} = "C:\\Users\\Admin\\AppData\\Roaming\\Omcih\\zyys.exe" zyys.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1872 set thread context of 2832 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe 2368 zyys.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe Token: SeSecurityPrivilege 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe Token: SeSecurityPrivilege 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2368 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 31 PID 1872 wrote to memory of 2368 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 31 PID 1872 wrote to memory of 2368 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 31 PID 1872 wrote to memory of 2368 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1064 2368 zyys.exe 18 PID 2368 wrote to memory of 1064 2368 zyys.exe 18 PID 2368 wrote to memory of 1064 2368 zyys.exe 18 PID 2368 wrote to memory of 1064 2368 zyys.exe 18 PID 2368 wrote to memory of 1064 2368 zyys.exe 18 PID 2368 wrote to memory of 1136 2368 zyys.exe 19 PID 2368 wrote to memory of 1136 2368 zyys.exe 19 PID 2368 wrote to memory of 1136 2368 zyys.exe 19 PID 2368 wrote to memory of 1136 2368 zyys.exe 19 PID 2368 wrote to memory of 1136 2368 zyys.exe 19 PID 2368 wrote to memory of 1192 2368 zyys.exe 21 PID 2368 wrote to memory of 1192 2368 zyys.exe 21 PID 2368 wrote to memory of 1192 2368 zyys.exe 21 PID 2368 wrote to memory of 1192 2368 zyys.exe 21 PID 2368 wrote to memory of 1192 2368 zyys.exe 21 PID 2368 wrote to memory of 1524 2368 zyys.exe 25 PID 2368 wrote to memory of 1524 2368 zyys.exe 25 PID 2368 wrote to memory of 1524 2368 zyys.exe 25 PID 2368 wrote to memory of 1524 2368 zyys.exe 25 PID 2368 wrote to memory of 1524 2368 zyys.exe 25 PID 2368 wrote to memory of 1872 2368 zyys.exe 30 PID 2368 wrote to memory of 1872 2368 zyys.exe 30 PID 2368 wrote to memory of 1872 2368 zyys.exe 30 PID 2368 wrote to memory of 1872 2368 zyys.exe 30 PID 2368 wrote to memory of 1872 2368 zyys.exe 30 PID 1872 wrote to memory of 2832 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 32 PID 1872 wrote to memory of 2832 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 32 PID 1872 wrote to memory of 2832 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 32 PID 1872 wrote to memory of 2832 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 32 PID 1872 wrote to memory of 2832 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 32 PID 1872 wrote to memory of 2832 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 32 PID 1872 wrote to memory of 2832 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 32 PID 1872 wrote to memory of 2832 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 32 PID 1872 wrote to memory of 2832 1872 69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1064
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1136
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69ab8189fff089a9d24ad5fe2cfeaa73_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Roaming\Omcih\zyys.exe"C:\Users\Admin\AppData\Roaming\Omcih\zyys.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc5503cbb.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5f5770a4bc45b1164994fad8bb22c9529
SHA1e11167c62347966edd855c1db2717eea5b491151
SHA256ede6afdd1572a621eadaac58d6f4ad5460bef9c6b32de7e8436df41026c28188
SHA512614648e2db2d9f1b93e9974740783f542e26a2430d10869b41088ec6f0e59ff1b0b8b6db1c31473e2886e5b680c39fdd90e44f687737718b7ae4a55186b7508b
-
Filesize
380B
MD558ccd00d798b133bf5507e0ba82a3a9d
SHA1b8a75e22fb726e5e91a1e82ad1234d23daa0c84d
SHA2568f183702d80b6aa9c3554e9215e95a04af1b8fea2401eb088c89caae2203dd4a
SHA512460617016b3fc6df924a8b8478470e94e7e7c4718191c66bf65d11167f68512fda415d38bf7f00079a417f3233fe769c0d83547e3f3064e5d24c0c71521a9db9
-
Filesize
190KB
MD548fb3ea379911527f31afb716064f3cf
SHA178201363e3925494b3e26dc74b515de062a78dd2
SHA2564fbf458551da59bceab26945205889c9d2843ff038f1229d82d86a56bf76b90f
SHA51207e62c3870ad4064022793f16103e575edbdd25b3b06bef64ae1f06087cc2b4d7ad48c271a8dcd29a3dfac6039250d0943ee595697220da2aeebd6be0cad66bc