Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe
-
Size
125KB
-
MD5
69b77826c504861a7671047f7c0119f0
-
SHA1
7932b4372e87c9c80293853d7bae86a666282dd6
-
SHA256
6c5772f8dafba29898ff741011afa7c43c99b188f19e902501a6f0629fe5b3e1
-
SHA512
43ea47fa4e949ff9279725c4d30897b2ff674994d4163e6e46b50ee9a79bdc91c9600e46a88cef7df898d3069a9aefc8cffc9935e80261f89b7f38a2f57f0a44
-
SSDEEP
3072:FTMKeVZkOiK4gZzRPQNrftdSQnGdFcT+vwT6Yf:FTMxZ7iK48dulkQnGdFLve
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2492 Kvoxoa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\BSRURUF55J = "C:\\Windows\\Kvoxoa.exe" Kvoxoa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe File created C:\Windows\Kvoxoa.exe 69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe File opened for modification C:\Windows\Kvoxoa.exe 69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kvoxoa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main Kvoxoa.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International Kvoxoa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe 2492 Kvoxoa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2632 69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe 2492 Kvoxoa.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2492 2632 69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe 31 PID 2632 wrote to memory of 2492 2632 69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe 31 PID 2632 wrote to memory of 2492 2632 69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe 31 PID 2632 wrote to memory of 2492 2632 69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe 31 PID 2632 wrote to memory of 2492 2632 69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe 31 PID 2632 wrote to memory of 2492 2632 69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe 31 PID 2632 wrote to memory of 2492 2632 69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69b77826c504861a7671047f7c0119f0_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\Kvoxoa.exeC:\Windows\Kvoxoa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD569b77826c504861a7671047f7c0119f0
SHA17932b4372e87c9c80293853d7bae86a666282dd6
SHA2566c5772f8dafba29898ff741011afa7c43c99b188f19e902501a6f0629fe5b3e1
SHA51243ea47fa4e949ff9279725c4d30897b2ff674994d4163e6e46b50ee9a79bdc91c9600e46a88cef7df898d3069a9aefc8cffc9935e80261f89b7f38a2f57f0a44
-
Filesize
372B
MD5af6ab34f93c7dd82679cad6f58be349a
SHA19dae7248f9d8946383f568cd5a2f8000a8bd1349
SHA2567ca8e133248f0ab0bf827567f7bc5a55db176d75dff4d4ef06472007a64ce1a1
SHA512cdc7028a1674d12874ef2a397c0fcd96a20c469ac780f75fca7b96e5149e89b2fe8704902ef4b62128237b8233e5b193982a174cfdde2e1f97b512c9b6b8e831