Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 23:20
Static task
static1
Behavioral task
behavioral1
Sample
66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe
-
Size
144KB
-
MD5
66c90d73705f5d63a6db439e98d4b278
-
SHA1
20e8768a69d2ae70fcee36d8c8a06ff668163635
-
SHA256
a0f0f69231b1fbd0895c7065fccb6debeedd54fcbe512ffc7a0eee4d191f338f
-
SHA512
89a2f0b15faef71c93f1aac37b6d5cbb6f77b25a4bb46cf99844fcb331a3e4948777b70bbddb76b67da50e0856ef9675a7f69dbff616a4c3eb7f70d6c032788e
-
SSDEEP
1536:wbq7elsRRQIFFdpkll9i9Y92MDnU8jji:mq7qsnFaVEaFi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 840 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2804 gabis.exe -
Loads dropped DLL 1 IoCs
pid Process 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\{81E79555-BCEB-56A6-49CD-EE96B1EEA472} = "C:\\Users\\Admin\\AppData\\Roaming\\Peunpa\\gabis.exe" gabis.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2092 set thread context of 840 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gabis.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Privacy 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\021213E8-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe 2804 gabis.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe Token: SeSecurityPrivilege 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe Token: SeSecurityPrivilege 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe Token: SeManageVolumePrivilege 1740 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1740 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1740 WinMail.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2804 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2804 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2804 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2804 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe 30 PID 2804 wrote to memory of 1116 2804 gabis.exe 19 PID 2804 wrote to memory of 1116 2804 gabis.exe 19 PID 2804 wrote to memory of 1116 2804 gabis.exe 19 PID 2804 wrote to memory of 1116 2804 gabis.exe 19 PID 2804 wrote to memory of 1116 2804 gabis.exe 19 PID 2804 wrote to memory of 1180 2804 gabis.exe 20 PID 2804 wrote to memory of 1180 2804 gabis.exe 20 PID 2804 wrote to memory of 1180 2804 gabis.exe 20 PID 2804 wrote to memory of 1180 2804 gabis.exe 20 PID 2804 wrote to memory of 1180 2804 gabis.exe 20 PID 2804 wrote to memory of 1208 2804 gabis.exe 21 PID 2804 wrote to memory of 1208 2804 gabis.exe 21 PID 2804 wrote to memory of 1208 2804 gabis.exe 21 PID 2804 wrote to memory of 1208 2804 gabis.exe 21 PID 2804 wrote to memory of 1208 2804 gabis.exe 21 PID 2804 wrote to memory of 640 2804 gabis.exe 25 PID 2804 wrote to memory of 640 2804 gabis.exe 25 PID 2804 wrote to memory of 640 2804 gabis.exe 25 PID 2804 wrote to memory of 640 2804 gabis.exe 25 PID 2804 wrote to memory of 640 2804 gabis.exe 25 PID 2804 wrote to memory of 2092 2804 gabis.exe 29 PID 2804 wrote to memory of 2092 2804 gabis.exe 29 PID 2804 wrote to memory of 2092 2804 gabis.exe 29 PID 2804 wrote to memory of 2092 2804 gabis.exe 29 PID 2804 wrote to memory of 2092 2804 gabis.exe 29 PID 2804 wrote to memory of 1740 2804 gabis.exe 31 PID 2804 wrote to memory of 1740 2804 gabis.exe 31 PID 2804 wrote to memory of 1740 2804 gabis.exe 31 PID 2804 wrote to memory of 1740 2804 gabis.exe 31 PID 2804 wrote to memory of 1740 2804 gabis.exe 31 PID 2092 wrote to memory of 840 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe 32 PID 2092 wrote to memory of 840 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe 32 PID 2092 wrote to memory of 840 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe 32 PID 2092 wrote to memory of 840 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe 32 PID 2092 wrote to memory of 840 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe 32 PID 2092 wrote to memory of 840 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe 32 PID 2092 wrote to memory of 840 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe 32 PID 2092 wrote to memory of 840 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe 32 PID 2092 wrote to memory of 840 2092 66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe 32 PID 2804 wrote to memory of 3032 2804 gabis.exe 34 PID 2804 wrote to memory of 3032 2804 gabis.exe 34 PID 2804 wrote to memory of 3032 2804 gabis.exe 34 PID 2804 wrote to memory of 3032 2804 gabis.exe 34 PID 2804 wrote to memory of 3032 2804 gabis.exe 34 PID 2804 wrote to memory of 1664 2804 gabis.exe 36 PID 2804 wrote to memory of 1664 2804 gabis.exe 36 PID 2804 wrote to memory of 1664 2804 gabis.exe 36 PID 2804 wrote to memory of 1664 2804 gabis.exe 36 PID 2804 wrote to memory of 1664 2804 gabis.exe 36
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\66c90d73705f5d63a6db439e98d4b278_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Roaming\Peunpa\gabis.exe"C:\Users\Admin\AppData\Roaming\Peunpa\gabis.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp4ea829bd.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:840
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:640
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1740
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3032
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD590ae0b4b5f01791be2a379c37c66c490
SHA1ed2cf1054a90eb14948882dfaad0391e8dcaa67d
SHA25659cac2649a37e789d9c98da633abaf5d8dfea7c8d23a04915a282028c4d215b2
SHA512ef270e60a84a628369a793e75b45cc07e92bbb920b3574e1e07c3bcf0ddc7a23d082a25f63f3b769567c18e1a05a0b9063d5610e4df2a651e975be6a8e5aaf3f
-
Filesize
271B
MD5b0f3b8d07d455bc672b44df5f501b8fe
SHA1560960a047bd6840ac08c90ba1ed085a95356e9a
SHA2562c2d59482c6e28243f1ce49810dba0920ecdae3fd75c37be70cddeccbba7e289
SHA512393f431d862599a837ba190f52597564888ea7026491c2b78fe7a424042b74ec75d96eeaf2e9aa68fb56d7354077d8c07e646fee4af697094a31123217966a16
-
Filesize
144KB
MD575db8e4d566629243f1074d7af09e572
SHA16baecb0a5cd118a41d34aeeb8da0e9f7c4094703
SHA2566b695613a855c38c8073ea0d22faf161f56c9837f9e9a7e8600147d27aa780cd
SHA5122e09301ceaef8ee030548b7ffe88606602453fcb7de003a2b9f2f1990f58a14785a6af397169fd9bc9162f22e5233fb169af106881caf22ff3fbdcb1963ddd30
-
Filesize
380B
MD5eea2cec50597dfb05ea42ee0328b5955
SHA19c32741acf283ee5dd9a8eb7ecc1815831dfe804
SHA25661b85f6023800df0df32382384f4da81c4b4ce10519defb316afaa060d5b790f
SHA512b4f7e5448388a02dbb8930c109dc9826e26fcab47476ce4d0b7b1e2f896727fc89cb70af4e8139110294921b82e1f78d56fff60fa81f7f38869210752d017dc2