Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28/07/2024, 01:25

General

  • Target

    04d20929198d39f14690afc83e185a46_JaffaCakes118.exe

  • Size

    294KB

  • MD5

    04d20929198d39f14690afc83e185a46

  • SHA1

    263dbcda0744e96620b4fcb6bf0ebb7e43c5f206

  • SHA256

    958851a04d6e9b3c7a46476128e0de8bd01936f61e1d79738b1a2486d3541c88

  • SHA512

    ba0e9a1b384de9604fe3d373f8abc39ab9682eb54643ec7d4064b8410cec7ae1967201edb6e5da18668b58fb8faa80bd8745f9ba77225608fe8c15317b3608ac

  • SSDEEP

    6144:EgOCMB7FAFJh6ydWE5k9wGajkc9Ywh+MXZBB8alTRTLsU4s:ESq7FAsyD57Ga7sMJBBj3XsLs

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1072
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1136
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1160
          • C:\Users\Admin\AppData\Local\Temp\04d20929198d39f14690afc83e185a46_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\04d20929198d39f14690afc83e185a46_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:1864
            • C:\Users\Admin\AppData\Roaming\Ighex\miqa.exe
              "C:\Users\Admin\AppData\Roaming\Ighex\miqa.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:1224
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc300434b.bat"
              3⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:2760
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1624

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\tmpc300434b.bat

                  Filesize

                  271B

                  MD5

                  dcedb04e646284802f51dc93f0362695

                  SHA1

                  c0fb18d04197c3e613e300c8fb010972f695b303

                  SHA256

                  390aebd2a633055de4de595732cf35e5af02015141158e078890c33a06b7ab7d

                  SHA512

                  fb9cab425769dd583ceedc7879fcb68b7a9f5c369c93739212884d594688f5235ee73fb8f5a7661b9bd14dc91318c9933f33d1d5d388b341359b57d27276da03

                • C:\Users\Admin\AppData\Roaming\Evbad\tepue.myx

                  Filesize

                  380B

                  MD5

                  e751809728347d05741db03e15e44f99

                  SHA1

                  a2c60ed5103b36f9910555a096258c5494e6b74f

                  SHA256

                  eab17c244faa3f134b61a0047886753b7513c6ba0ff3313a470115e2cf7927f5

                  SHA512

                  08d9743e508b94146c6b26e359163c3dc9b38684b796de22fc83b0af7e6af54fc61b2f023ef2f49474aa087e74f2be16aac175296ed5b2c84a51f1ac88f224c8

                • \Users\Admin\AppData\Roaming\Ighex\miqa.exe

                  Filesize

                  294KB

                  MD5

                  ec787900ae31b7236bcf8e5e7b0986df

                  SHA1

                  223ba8a87a312d196f746e2137af87e14572f42d

                  SHA256

                  0d5daf5264980730b6791690c6de3be903e992abd37dc68afb3b1435bea161b9

                  SHA512

                  c1b24583b9358ebe2856f1148c08c66bc6de80a7fc3f4c57d05c3de6249e32e883b0c9294686af1a200a3d9aecf924787ba976a9734402b43aac96ebc424ce23

                • memory/1072-22-0x0000000000680000-0x00000000006C1000-memory.dmp

                  Filesize

                  260KB

                • memory/1072-23-0x0000000000680000-0x00000000006C1000-memory.dmp

                  Filesize

                  260KB

                • memory/1072-21-0x0000000000680000-0x00000000006C1000-memory.dmp

                  Filesize

                  260KB

                • memory/1072-19-0x0000000000680000-0x00000000006C1000-memory.dmp

                  Filesize

                  260KB

                • memory/1072-20-0x0000000000680000-0x00000000006C1000-memory.dmp

                  Filesize

                  260KB

                • memory/1136-29-0x0000000001FC0000-0x0000000002001000-memory.dmp

                  Filesize

                  260KB

                • memory/1136-31-0x0000000001FC0000-0x0000000002001000-memory.dmp

                  Filesize

                  260KB

                • memory/1136-25-0x0000000001FC0000-0x0000000002001000-memory.dmp

                  Filesize

                  260KB

                • memory/1136-27-0x0000000001FC0000-0x0000000002001000-memory.dmp

                  Filesize

                  260KB

                • memory/1160-36-0x0000000002560000-0x00000000025A1000-memory.dmp

                  Filesize

                  260KB

                • memory/1160-37-0x0000000002560000-0x00000000025A1000-memory.dmp

                  Filesize

                  260KB

                • memory/1160-34-0x0000000002560000-0x00000000025A1000-memory.dmp

                  Filesize

                  260KB

                • memory/1160-35-0x0000000002560000-0x00000000025A1000-memory.dmp

                  Filesize

                  260KB

                • memory/1224-279-0x0000000000400000-0x0000000000441000-memory.dmp

                  Filesize

                  260KB

                • memory/1224-18-0x0000000000400000-0x0000000000441000-memory.dmp

                  Filesize

                  260KB

                • memory/1224-15-0x0000000000270000-0x00000000002B1000-memory.dmp

                  Filesize

                  260KB

                • memory/1224-16-0x00000000003B0000-0x00000000003FE000-memory.dmp

                  Filesize

                  312KB

                • memory/1624-42-0x0000000001F40000-0x0000000001F81000-memory.dmp

                  Filesize

                  260KB

                • memory/1624-43-0x0000000001F40000-0x0000000001F81000-memory.dmp

                  Filesize

                  260KB

                • memory/1624-40-0x0000000001F40000-0x0000000001F81000-memory.dmp

                  Filesize

                  260KB

                • memory/1624-41-0x0000000001F40000-0x0000000001F81000-memory.dmp

                  Filesize

                  260KB

                • memory/1864-56-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-76-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-60-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-59-0x0000000077970000-0x0000000077971000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-58-0x0000000001D70000-0x0000000001DB1000-memory.dmp

                  Filesize

                  260KB

                • memory/1864-54-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-52-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-50-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-49-0x0000000001D70000-0x0000000001DB1000-memory.dmp

                  Filesize

                  260KB

                • memory/1864-48-0x0000000001D70000-0x0000000001DB1000-memory.dmp

                  Filesize

                  260KB

                • memory/1864-47-0x0000000001D70000-0x0000000001DB1000-memory.dmp

                  Filesize

                  260KB

                • memory/1864-46-0x0000000001D70000-0x0000000001DB1000-memory.dmp

                  Filesize

                  260KB

                • memory/1864-45-0x0000000001D70000-0x0000000001DB1000-memory.dmp

                  Filesize

                  260KB

                • memory/1864-66-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-68-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-72-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-74-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-62-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-78-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-80-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-82-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-70-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-64-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-2-0x0000000000400000-0x0000000000441000-memory.dmp

                  Filesize

                  260KB

                • memory/1864-3-0x0000000000400000-0x0000000000441000-memory.dmp

                  Filesize

                  260KB

                • memory/1864-4-0x0000000000400000-0x0000000000441000-memory.dmp

                  Filesize

                  260KB

                • memory/1864-134-0x0000000000250000-0x0000000000251000-memory.dmp

                  Filesize

                  4KB

                • memory/1864-160-0x0000000001D70000-0x0000000001DB1000-memory.dmp

                  Filesize

                  260KB

                • memory/1864-158-0x0000000000400000-0x0000000000441000-memory.dmp

                  Filesize

                  260KB

                • memory/1864-5-0x0000000000400000-0x0000000000441000-memory.dmp

                  Filesize

                  260KB

                • memory/1864-159-0x0000000000380000-0x00000000003CE000-memory.dmp

                  Filesize

                  312KB

                • memory/1864-0-0x0000000000330000-0x0000000000371000-memory.dmp

                  Filesize

                  260KB

                • memory/1864-1-0x0000000000380000-0x00000000003CE000-memory.dmp

                  Filesize

                  312KB