Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe
-
Size
262KB
-
MD5
7580de5edbe07ae539d7021b092d2b29
-
SHA1
d3839b47e35cc6c14872b164d71d137ef9211f70
-
SHA256
589102099622ea5e39289aee3819242650a5b5f418eb6827c4c60201a09161e2
-
SHA512
1b1555631e3f9510d0d1fdf2cabeee33b5408ee738358c3f2bceafd4c02b201d8ac00f21004eab8d56cc39ed4c9be7984e68df66187810dca6382fee8011f15e
-
SSDEEP
6144:HU8Gp+df0afmVTRMdOdpn94sLrNXel9jb98+MAkC:08YkfXf4TRMS94svNuzjb9ZD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2696 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2416 ojez.exe -
Loads dropped DLL 1 IoCs
pid Process 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\{75DA6328-6F30-AD4F-96DD-2BAD86C808B0} = "C:\\Users\\Admin\\AppData\\Roaming\\Zeuteb\\ojez.exe" ojez.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 828 set thread context of 2696 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe 2416 ojez.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe Token: SeSecurityPrivilege 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe Token: SeSecurityPrivilege 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 2416 ojez.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 828 wrote to memory of 2416 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 30 PID 828 wrote to memory of 2416 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 30 PID 828 wrote to memory of 2416 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 30 PID 828 wrote to memory of 2416 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 30 PID 2416 wrote to memory of 1116 2416 ojez.exe 19 PID 2416 wrote to memory of 1116 2416 ojez.exe 19 PID 2416 wrote to memory of 1116 2416 ojez.exe 19 PID 2416 wrote to memory of 1116 2416 ojez.exe 19 PID 2416 wrote to memory of 1116 2416 ojez.exe 19 PID 2416 wrote to memory of 1204 2416 ojez.exe 20 PID 2416 wrote to memory of 1204 2416 ojez.exe 20 PID 2416 wrote to memory of 1204 2416 ojez.exe 20 PID 2416 wrote to memory of 1204 2416 ojez.exe 20 PID 2416 wrote to memory of 1204 2416 ojez.exe 20 PID 2416 wrote to memory of 1252 2416 ojez.exe 21 PID 2416 wrote to memory of 1252 2416 ojez.exe 21 PID 2416 wrote to memory of 1252 2416 ojez.exe 21 PID 2416 wrote to memory of 1252 2416 ojez.exe 21 PID 2416 wrote to memory of 1252 2416 ojez.exe 21 PID 2416 wrote to memory of 932 2416 ojez.exe 25 PID 2416 wrote to memory of 932 2416 ojez.exe 25 PID 2416 wrote to memory of 932 2416 ojez.exe 25 PID 2416 wrote to memory of 932 2416 ojez.exe 25 PID 2416 wrote to memory of 932 2416 ojez.exe 25 PID 2416 wrote to memory of 828 2416 ojez.exe 29 PID 2416 wrote to memory of 828 2416 ojez.exe 29 PID 2416 wrote to memory of 828 2416 ojez.exe 29 PID 2416 wrote to memory of 828 2416 ojez.exe 29 PID 2416 wrote to memory of 828 2416 ojez.exe 29 PID 828 wrote to memory of 2696 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 31 PID 828 wrote to memory of 2696 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 31 PID 828 wrote to memory of 2696 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 31 PID 828 wrote to memory of 2696 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 31 PID 828 wrote to memory of 2696 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 31 PID 828 wrote to memory of 2696 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 31 PID 828 wrote to memory of 2696 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 31 PID 828 wrote to memory of 2696 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 31 PID 828 wrote to memory of 2696 828 7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1204
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7580de5edbe07ae539d7021b092d2b29_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Roaming\Zeuteb\ojez.exe"C:\Users\Admin\AppData\Roaming\Zeuteb\ojez.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2416
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6d524c68.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2696
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD557df20a3c82edad588a75c3c850cf963
SHA1007a281cc9217b4468e3446d02ef702b0adf4e42
SHA2568c9e32d6709d60e917c397e8765a51fcd83f68f3848721cdf777e7d6f1dff559
SHA5121829625be9546a17e138a532f092debcbfae8a0dd843bc86754e2b261abdd9efddc3710c1e35199000981667e881c519764b1d48d2bee39f7fbbfc3f904b82b3
-
Filesize
380B
MD51fe97218ebeae753be13306223633d76
SHA1ac319a33709243b93d98ce76d87e3aee34d28f80
SHA256a3122b30955fe2ffb5a3af3eb42daa2bdc3b7d4e61f4e032b9dc83a3a37c26a7
SHA51237be4e489ac42f7808a46365dc9d2723447ac2373d4ee9c198b327b6b8191a7e705aee4e734834006b0d560fc43ef156cdc84f088e93ca04f6161e206b7a6236
-
Filesize
262KB
MD5af71ee673c9728de04ec519891fb6288
SHA1e4590adf5343ffa875e922a77814b5a1080e9ecd
SHA2565f5656f87fd60558e52996fffff82ecdc3d7c0776116c41030773f160a306c7d
SHA51213a1c8f22cc4167c938d4e95b51d8487fad2672e07167691d4cb03b5882b2afecf5add306f10766390520fd63c2ac4741cff8f90885738675fcb9f08f38398a6