Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/07/2024, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
04d20929198d39f14690afc83e185a46_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
04d20929198d39f14690afc83e185a46_JaffaCakes118.exe
Resource
win10v2004-20240729-en
General
-
Target
04d20929198d39f14690afc83e185a46_JaffaCakes118.exe
-
Size
294KB
-
MD5
04d20929198d39f14690afc83e185a46
-
SHA1
263dbcda0744e96620b4fcb6bf0ebb7e43c5f206
-
SHA256
958851a04d6e9b3c7a46476128e0de8bd01936f61e1d79738b1a2486d3541c88
-
SHA512
ba0e9a1b384de9604fe3d373f8abc39ab9682eb54643ec7d4064b8410cec7ae1967201edb6e5da18668b58fb8faa80bd8745f9ba77225608fe8c15317b3608ac
-
SSDEEP
6144:EgOCMB7FAFJh6ydWE5k9wGajkc9Ywh+MXZBB8alTRTLsU4s:ESq7FAsyD57Ga7sMJBBj3XsLs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1224 miqa.exe -
Loads dropped DLL 2 IoCs
pid Process 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\{36F482E8-6FE9-AD4F-5F98-37194FCB1404} = "C:\\Users\\Admin\\AppData\\Roaming\\Ighex\\miqa.exe" miqa.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1864 set thread context of 2760 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language miqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Privacy 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe 1224 miqa.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe Token: SeSecurityPrivilege 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe Token: SeSecurityPrivilege 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 1224 miqa.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1864 wrote to memory of 1224 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 31 PID 1864 wrote to memory of 1224 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 31 PID 1864 wrote to memory of 1224 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 31 PID 1864 wrote to memory of 1224 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 31 PID 1224 wrote to memory of 1072 1224 miqa.exe 18 PID 1224 wrote to memory of 1072 1224 miqa.exe 18 PID 1224 wrote to memory of 1072 1224 miqa.exe 18 PID 1224 wrote to memory of 1072 1224 miqa.exe 18 PID 1224 wrote to memory of 1072 1224 miqa.exe 18 PID 1224 wrote to memory of 1136 1224 miqa.exe 19 PID 1224 wrote to memory of 1136 1224 miqa.exe 19 PID 1224 wrote to memory of 1136 1224 miqa.exe 19 PID 1224 wrote to memory of 1136 1224 miqa.exe 19 PID 1224 wrote to memory of 1136 1224 miqa.exe 19 PID 1224 wrote to memory of 1160 1224 miqa.exe 20 PID 1224 wrote to memory of 1160 1224 miqa.exe 20 PID 1224 wrote to memory of 1160 1224 miqa.exe 20 PID 1224 wrote to memory of 1160 1224 miqa.exe 20 PID 1224 wrote to memory of 1160 1224 miqa.exe 20 PID 1224 wrote to memory of 1624 1224 miqa.exe 25 PID 1224 wrote to memory of 1624 1224 miqa.exe 25 PID 1224 wrote to memory of 1624 1224 miqa.exe 25 PID 1224 wrote to memory of 1624 1224 miqa.exe 25 PID 1224 wrote to memory of 1624 1224 miqa.exe 25 PID 1224 wrote to memory of 1864 1224 miqa.exe 30 PID 1224 wrote to memory of 1864 1224 miqa.exe 30 PID 1224 wrote to memory of 1864 1224 miqa.exe 30 PID 1224 wrote to memory of 1864 1224 miqa.exe 30 PID 1224 wrote to memory of 1864 1224 miqa.exe 30 PID 1864 wrote to memory of 2760 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 32 PID 1864 wrote to memory of 2760 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 32 PID 1864 wrote to memory of 2760 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 32 PID 1864 wrote to memory of 2760 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 32 PID 1864 wrote to memory of 2760 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 32 PID 1864 wrote to memory of 2760 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 32 PID 1864 wrote to memory of 2760 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 32 PID 1864 wrote to memory of 2760 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 32 PID 1864 wrote to memory of 2760 1864 04d20929198d39f14690afc83e185a46_JaffaCakes118.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1072
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1136
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\04d20929198d39f14690afc83e185a46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04d20929198d39f14690afc83e185a46_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Roaming\Ighex\miqa.exe"C:\Users\Admin\AppData\Roaming\Ighex\miqa.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1224
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc300434b.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2760
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5dcedb04e646284802f51dc93f0362695
SHA1c0fb18d04197c3e613e300c8fb010972f695b303
SHA256390aebd2a633055de4de595732cf35e5af02015141158e078890c33a06b7ab7d
SHA512fb9cab425769dd583ceedc7879fcb68b7a9f5c369c93739212884d594688f5235ee73fb8f5a7661b9bd14dc91318c9933f33d1d5d388b341359b57d27276da03
-
Filesize
380B
MD5e751809728347d05741db03e15e44f99
SHA1a2c60ed5103b36f9910555a096258c5494e6b74f
SHA256eab17c244faa3f134b61a0047886753b7513c6ba0ff3313a470115e2cf7927f5
SHA51208d9743e508b94146c6b26e359163c3dc9b38684b796de22fc83b0af7e6af54fc61b2f023ef2f49474aa087e74f2be16aac175296ed5b2c84a51f1ac88f224c8
-
Filesize
294KB
MD5ec787900ae31b7236bcf8e5e7b0986df
SHA1223ba8a87a312d196f746e2137af87e14572f42d
SHA2560d5daf5264980730b6791690c6de3be903e992abd37dc68afb3b1435bea161b9
SHA512c1b24583b9358ebe2856f1148c08c66bc6de80a7fc3f4c57d05c3de6249e32e883b0c9294686af1a200a3d9aecf924787ba976a9734402b43aac96ebc424ce23