Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe
-
Size
282KB
-
MD5
72062bd22e0af0e97b4861889fa51df8
-
SHA1
a655f3d279c835797b07278d072027c546ca6032
-
SHA256
9ce33b4f37c67b4792d66e8134c8668a6d55361edb9702fcaa63d17f5771faf7
-
SHA512
0290a3269386c9c1db0aad47b4eb14999fcb05da50c2498bc3fa4daae187c17217afbbfa76617a5978fa96796605925ee48500cfb4f37c269bc67e626746bb42
-
SSDEEP
6144:YQ2HPZA9jslC3Nvju9NCjV+GenP8L3JTLLeV:/2HPe9jJdwN+V+GenEDpLk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2432 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2128 omah.exe -
Loads dropped DLL 2 IoCs
pid Process 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F4363D88-6FEF-AD4F-FCEF-4765F9626478} = "C:\\Users\\Admin\\AppData\\Roaming\\Ebxy\\omah.exe" omah.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2340 set thread context of 2432 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Privacy 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe 2128 omah.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe Token: SeSecurityPrivilege 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe Token: SeSecurityPrivilege 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 2128 omah.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2128 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2128 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2128 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2128 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 30 PID 2128 wrote to memory of 1092 2128 omah.exe 19 PID 2128 wrote to memory of 1092 2128 omah.exe 19 PID 2128 wrote to memory of 1092 2128 omah.exe 19 PID 2128 wrote to memory of 1092 2128 omah.exe 19 PID 2128 wrote to memory of 1092 2128 omah.exe 19 PID 2128 wrote to memory of 1148 2128 omah.exe 20 PID 2128 wrote to memory of 1148 2128 omah.exe 20 PID 2128 wrote to memory of 1148 2128 omah.exe 20 PID 2128 wrote to memory of 1148 2128 omah.exe 20 PID 2128 wrote to memory of 1148 2128 omah.exe 20 PID 2128 wrote to memory of 1180 2128 omah.exe 21 PID 2128 wrote to memory of 1180 2128 omah.exe 21 PID 2128 wrote to memory of 1180 2128 omah.exe 21 PID 2128 wrote to memory of 1180 2128 omah.exe 21 PID 2128 wrote to memory of 1180 2128 omah.exe 21 PID 2128 wrote to memory of 1284 2128 omah.exe 25 PID 2128 wrote to memory of 1284 2128 omah.exe 25 PID 2128 wrote to memory of 1284 2128 omah.exe 25 PID 2128 wrote to memory of 1284 2128 omah.exe 25 PID 2128 wrote to memory of 1284 2128 omah.exe 25 PID 2128 wrote to memory of 2340 2128 omah.exe 29 PID 2128 wrote to memory of 2340 2128 omah.exe 29 PID 2128 wrote to memory of 2340 2128 omah.exe 29 PID 2128 wrote to memory of 2340 2128 omah.exe 29 PID 2128 wrote to memory of 2340 2128 omah.exe 29 PID 2340 wrote to memory of 2432 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2432 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2432 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2432 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2432 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2432 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2432 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2432 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2432 2340 72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1092
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1148
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\72062bd22e0af0e97b4861889fa51df8_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Roaming\Ebxy\omah.exe"C:\Users\Admin\AppData\Roaming\Ebxy\omah.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8539c1f8.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2432
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD57fb42705837df063bed5e905f6de709f
SHA1629f4550c3873a91a2c9e1b979b0f9834d67874c
SHA2561ece37ab08e40de9518bd957adc67d8a91f5e0c529978210d0869e30ba8d5d4a
SHA51292c3c489695ab16513a3cd52c1f7bb5c4e4f6c00642a1a5ab57636912d12f2cbb7d92b7bdd934e5fdeee44d7011f29a798ba42e8e3df3f5998939493f56035f0
-
Filesize
282KB
MD5feeaab254a18fb98623c0f37665f1ade
SHA13aafbf01d7dd9ba893fe09505d956c76d674a171
SHA256b12a3bf9024e3773cdd8c1693e05369bbc1014f514fe102eee269842c76fbeb7
SHA512768d98cf1008784b62b7a0b50f1792e5e4fbc9026ad681e264b93e2d19371e186a57a740cc3363b8f599959621e7774010d216627f5bc7190e551f1085cca249
-
Filesize
380B
MD53d03c7823f9c079f3fa3bf906b99eaed
SHA1816c3f2faff64a5c6cccd6545eb237684cfffd2d
SHA25660890cbbfc039b516f7f8855620045ba1c2e40d73cc04fa20e48c9c293e8fe7a
SHA5123168f350c0d3928252cba39f5d8e90ce80f0979e9442a2bb0850dd50a7510a53898355603af3a4f419c0d97e9b48c09bc8fec8340a28434affaaaed5aea4181a