Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 01:11
Static task
static1
Behavioral task
behavioral1
Sample
72055a377c08037a8481403644be11eb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
72055a377c08037a8481403644be11eb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
72055a377c08037a8481403644be11eb_JaffaCakes118.exe
-
Size
309KB
-
MD5
72055a377c08037a8481403644be11eb
-
SHA1
9f7a8032adb587047c2dcaa6067d323e8f578762
-
SHA256
10e99ab136ccbc6c466cc38ea9ea70260ce5e3f1acd6c6c1825a78c74ae97a42
-
SHA512
6b0258ffb1aa555f5c634b0e938375d5d9e56f90bceb06b7b8eff871a9bfb6785d79979778442310baa521e7e0a82f486bdbabfbae5637e4caf4dac0dfa5e500
-
SSDEEP
6144:GwhzQ9Skr2I6jFZNp0H8vIz3YX5Sze2wpchpkUJ1HLBh4kHIJ:GrSM6jtQTKk9h1HLAJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2368 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2064 qalyq.exe -
Loads dropped DLL 2 IoCs
pid Process 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F4363D88-6FEF-AD4F-FCEF-4765F9626478} = "C:\\Users\\Admin\\AppData\\Roaming\\Luso\\qalyq.exe" qalyq.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 332 set thread context of 2368 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72055a377c08037a8481403644be11eb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qalyq.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 72055a377c08037a8481403644be11eb_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Privacy 72055a377c08037a8481403644be11eb_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe 2064 qalyq.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 2064 qalyq.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 332 wrote to memory of 2064 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 31 PID 332 wrote to memory of 2064 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 31 PID 332 wrote to memory of 2064 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 31 PID 332 wrote to memory of 2064 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 31 PID 2064 wrote to memory of 1116 2064 qalyq.exe 19 PID 2064 wrote to memory of 1116 2064 qalyq.exe 19 PID 2064 wrote to memory of 1116 2064 qalyq.exe 19 PID 2064 wrote to memory of 1116 2064 qalyq.exe 19 PID 2064 wrote to memory of 1116 2064 qalyq.exe 19 PID 2064 wrote to memory of 1196 2064 qalyq.exe 20 PID 2064 wrote to memory of 1196 2064 qalyq.exe 20 PID 2064 wrote to memory of 1196 2064 qalyq.exe 20 PID 2064 wrote to memory of 1196 2064 qalyq.exe 20 PID 2064 wrote to memory of 1196 2064 qalyq.exe 20 PID 2064 wrote to memory of 1256 2064 qalyq.exe 21 PID 2064 wrote to memory of 1256 2064 qalyq.exe 21 PID 2064 wrote to memory of 1256 2064 qalyq.exe 21 PID 2064 wrote to memory of 1256 2064 qalyq.exe 21 PID 2064 wrote to memory of 1256 2064 qalyq.exe 21 PID 2064 wrote to memory of 1884 2064 qalyq.exe 25 PID 2064 wrote to memory of 1884 2064 qalyq.exe 25 PID 2064 wrote to memory of 1884 2064 qalyq.exe 25 PID 2064 wrote to memory of 1884 2064 qalyq.exe 25 PID 2064 wrote to memory of 1884 2064 qalyq.exe 25 PID 2064 wrote to memory of 332 2064 qalyq.exe 30 PID 2064 wrote to memory of 332 2064 qalyq.exe 30 PID 2064 wrote to memory of 332 2064 qalyq.exe 30 PID 2064 wrote to memory of 332 2064 qalyq.exe 30 PID 2064 wrote to memory of 332 2064 qalyq.exe 30 PID 332 wrote to memory of 2368 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 32 PID 332 wrote to memory of 2368 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 32 PID 332 wrote to memory of 2368 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 32 PID 332 wrote to memory of 2368 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 32 PID 332 wrote to memory of 2368 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 32 PID 332 wrote to memory of 2368 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 32 PID 332 wrote to memory of 2368 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 32 PID 332 wrote to memory of 2368 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 32 PID 332 wrote to memory of 2368 332 72055a377c08037a8481403644be11eb_JaffaCakes118.exe 32 PID 2064 wrote to memory of 2616 2064 qalyq.exe 34 PID 2064 wrote to memory of 2616 2064 qalyq.exe 34 PID 2064 wrote to memory of 2616 2064 qalyq.exe 34 PID 2064 wrote to memory of 2616 2064 qalyq.exe 34 PID 2064 wrote to memory of 2616 2064 qalyq.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1196
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\72055a377c08037a8481403644be11eb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\72055a377c08037a8481403644be11eb_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Users\Admin\AppData\Roaming\Luso\qalyq.exe"C:\Users\Admin\AppData\Roaming\Luso\qalyq.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc27baaeb.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2368
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1884
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5e491b6002e9f683b6429e1badaa24d77
SHA13892bfa867bbc23a3cd146beea13ca1e53226d21
SHA2567a12aeb7fa624cb4b7c4d118c48d698bad9bf9c661db5081bb312bb7fdd52af8
SHA512341d728506d756989a7c4eb54ed3e538ea823064fd1f6a155737d4709ad3d3dfea716114487229c2a4337741407c0f7f2b9172dab6622cbc102413c1e1961bbe
-
Filesize
309KB
MD5a0db89f9911f780dc3e048758cdf04f8
SHA1cf79bda44eb2d2a9fb1c3804048408028bd69fff
SHA256fe05ab5133b89195c4091a0b8026d6551256cfe8c90a23f868795ea8b59023b3
SHA512f0bd6ca1516e0777734d592198fb63de431bd2136cf5188e3f9e8e3f597936e8911ba17fa2546cb4b046e909ccba1fceb4dcef8b31366f571abb88d8ba7d4abe