Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe
-
Size
293KB
-
MD5
779156930f35c787b6db9d4a3c33cc05
-
SHA1
171214c93c3fbe11e06480588bd38ef4f5b67981
-
SHA256
66c7f9516e0f564e90ac8fa9c783bc29c3a57bd98d76bae797945ee4a4495d71
-
SHA512
65bb46caa2607fc6703a1614227a804aef6749bdaa3b58a379615e971b3f47f4c9cc177c1536498ccc7a1e0d824048c8818c73b4f393dfca1b4b97aeab3f0e8c
-
SSDEEP
6144:EPdMyMANEVzGlcEDUl4qaRYVQ+CJTGbusJRhgnGXcjD7Xm2BeddhMHpmMDr:mNEh8cSLqdtCsisDhgnGABBedDMJmMX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 596 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2536 vuoqa.exe -
Loads dropped DLL 2 IoCs
pid Process 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\{3109E6C8-6F84-AD4F-D756-D1AEF6AEF2B3} = "C:\\Users\\Admin\\AppData\\Roaming\\Ucygeg\\vuoqa.exe" vuoqa.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3016 set thread context of 596 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vuoqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Privacy 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe 2536 vuoqa.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe Token: SeSecurityPrivilege 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe Token: SeSecurityPrivilege 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 2536 vuoqa.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2536 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2536 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2536 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2536 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 30 PID 2536 wrote to memory of 1120 2536 vuoqa.exe 19 PID 2536 wrote to memory of 1120 2536 vuoqa.exe 19 PID 2536 wrote to memory of 1120 2536 vuoqa.exe 19 PID 2536 wrote to memory of 1120 2536 vuoqa.exe 19 PID 2536 wrote to memory of 1120 2536 vuoqa.exe 19 PID 2536 wrote to memory of 1168 2536 vuoqa.exe 20 PID 2536 wrote to memory of 1168 2536 vuoqa.exe 20 PID 2536 wrote to memory of 1168 2536 vuoqa.exe 20 PID 2536 wrote to memory of 1168 2536 vuoqa.exe 20 PID 2536 wrote to memory of 1168 2536 vuoqa.exe 20 PID 2536 wrote to memory of 1216 2536 vuoqa.exe 21 PID 2536 wrote to memory of 1216 2536 vuoqa.exe 21 PID 2536 wrote to memory of 1216 2536 vuoqa.exe 21 PID 2536 wrote to memory of 1216 2536 vuoqa.exe 21 PID 2536 wrote to memory of 1216 2536 vuoqa.exe 21 PID 2536 wrote to memory of 1208 2536 vuoqa.exe 23 PID 2536 wrote to memory of 1208 2536 vuoqa.exe 23 PID 2536 wrote to memory of 1208 2536 vuoqa.exe 23 PID 2536 wrote to memory of 1208 2536 vuoqa.exe 23 PID 2536 wrote to memory of 1208 2536 vuoqa.exe 23 PID 2536 wrote to memory of 3016 2536 vuoqa.exe 29 PID 2536 wrote to memory of 3016 2536 vuoqa.exe 29 PID 2536 wrote to memory of 3016 2536 vuoqa.exe 29 PID 2536 wrote to memory of 3016 2536 vuoqa.exe 29 PID 2536 wrote to memory of 3016 2536 vuoqa.exe 29 PID 3016 wrote to memory of 596 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 31 PID 3016 wrote to memory of 596 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 31 PID 3016 wrote to memory of 596 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 31 PID 3016 wrote to memory of 596 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 31 PID 3016 wrote to memory of 596 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 31 PID 3016 wrote to memory of 596 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 31 PID 3016 wrote to memory of 596 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 31 PID 3016 wrote to memory of 596 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 31 PID 3016 wrote to memory of 596 3016 779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\779156930f35c787b6db9d4a3c33cc05_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Roaming\Ucygeg\vuoqa.exe"C:\Users\Admin\AppData\Roaming\Ucygeg\vuoqa.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc2892388.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:596
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5f2435e79c1cb5c0caf5403820ef7f510
SHA1d5eb92169cb10222bd06a16ff35e9b68ec1739d9
SHA25612842336f819525935bc79b48ca37ffc48a13c11ea1cd9d8aa67c074f51e6c9b
SHA512db9cd321cc6e88f6fedf328cbaf59ce84957ac0aa48049bafabea5e668b65c6d224691b9b6ea50658ac608e5240772baf56d8b1a49e38073421dca5b5d3b907a
-
Filesize
380B
MD5cd31cef25f558f2d441dab4061802dcc
SHA1d6e562fa1dbe2272d47a30dbfb3e9207cd912d58
SHA256bd3fe583e06a3b7e6eeac330eaddaf8511e39bdf54dc5dbf38406b27f4ae929c
SHA5129da151a554b0e49080e70c38e07fd2614e3ef0915ab16f82073948d52903b023f33c41d971d988f94041d27d3a1e1e74fee4d2319560fe1fffcef5888b2d6857
-
Filesize
293KB
MD59cc18007cb2eb28bb275289677d2a323
SHA1350bfbc9ecb6c18daf268b75a7a92dfef1409ad8
SHA256b791bd8450475d8aa73a84f792a307e9b9fe0336cc0e1cdd627dab4f89e0b630
SHA51262b0b7ffc2525e59f754610f74c705fdb06d4505f3a67f7943a1eee419dc541c3166d3e08569a6fa251b9075bf8a7b5793515bf864362b052d9172880873c938