Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe
-
Size
187KB
-
MD5
81cc9767249f29c80138fb5d06cecb4c
-
SHA1
43516075d79d984b1139e9bf09d74beeac564488
-
SHA256
32c8c88970559634f0d7ecf58f2e69077b6d646e50c96b1a8b035a1ca3f789ba
-
SHA512
207c9ee472499a4e6db50fe9cbd05fdb63f6c9c707239db8b01c0b1c14247d2eddc8dfdeb0a84b105c82ca1cff0a412d504ea860c2b197474f150fd4c913c027
-
SSDEEP
3072:c42SlppitxzLgqhkEhyyo/vFPL2hrzmSXy7tbGA0dLwoR3+nz:c4HlALLkqo+9XiNGA0dUoF+nz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1684 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2096 zuore.exe -
Loads dropped DLL 2 IoCs
pid Process 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\{0DC3AB95-025F-7D8B-818A-D049889D802B} = "C:\\Users\\Admin\\AppData\\Roaming\\Potyle\\zuore.exe" zuore.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1696 set thread context of 1684 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Privacy 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 2096 zuore.exe 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 2096 zuore.exe 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 2096 zuore.exe 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 2096 zuore.exe 2096 zuore.exe 1684 cmd.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe 2096 zuore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2096 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 30 PID 1696 wrote to memory of 2096 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 30 PID 1696 wrote to memory of 2096 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 30 PID 1696 wrote to memory of 2096 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 30 PID 2096 wrote to memory of 1088 2096 zuore.exe 19 PID 2096 wrote to memory of 1088 2096 zuore.exe 19 PID 2096 wrote to memory of 1088 2096 zuore.exe 19 PID 2096 wrote to memory of 1088 2096 zuore.exe 19 PID 2096 wrote to memory of 1088 2096 zuore.exe 19 PID 2096 wrote to memory of 1160 2096 zuore.exe 20 PID 2096 wrote to memory of 1160 2096 zuore.exe 20 PID 2096 wrote to memory of 1160 2096 zuore.exe 20 PID 2096 wrote to memory of 1160 2096 zuore.exe 20 PID 2096 wrote to memory of 1160 2096 zuore.exe 20 PID 2096 wrote to memory of 1188 2096 zuore.exe 21 PID 2096 wrote to memory of 1188 2096 zuore.exe 21 PID 2096 wrote to memory of 1188 2096 zuore.exe 21 PID 2096 wrote to memory of 1188 2096 zuore.exe 21 PID 2096 wrote to memory of 1188 2096 zuore.exe 21 PID 2096 wrote to memory of 1652 2096 zuore.exe 25 PID 2096 wrote to memory of 1652 2096 zuore.exe 25 PID 2096 wrote to memory of 1652 2096 zuore.exe 25 PID 2096 wrote to memory of 1652 2096 zuore.exe 25 PID 2096 wrote to memory of 1652 2096 zuore.exe 25 PID 2096 wrote to memory of 1696 2096 zuore.exe 29 PID 2096 wrote to memory of 1696 2096 zuore.exe 29 PID 2096 wrote to memory of 1696 2096 zuore.exe 29 PID 2096 wrote to memory of 1696 2096 zuore.exe 29 PID 2096 wrote to memory of 1696 2096 zuore.exe 29 PID 1696 wrote to memory of 1684 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 31 PID 1696 wrote to memory of 1684 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 31 PID 1696 wrote to memory of 1684 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 31 PID 1696 wrote to memory of 1684 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 31 PID 1696 wrote to memory of 1684 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 31 PID 1696 wrote to memory of 1684 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 31 PID 1696 wrote to memory of 1684 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 31 PID 1696 wrote to memory of 1684 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 31 PID 1696 wrote to memory of 1684 1696 81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe 31 PID 2096 wrote to memory of 1256 2096 zuore.exe 32 PID 2096 wrote to memory of 1256 2096 zuore.exe 32 PID 2096 wrote to memory of 1256 2096 zuore.exe 32 PID 2096 wrote to memory of 1256 2096 zuore.exe 32 PID 2096 wrote to memory of 1256 2096 zuore.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1088
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81cc9767249f29c80138fb5d06cecb4c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\Potyle\zuore.exe"C:\Users\Admin\AppData\Roaming\Potyle\zuore.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2096
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfd70c664.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1652
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-20812433641863419477499524721167981319318536105051649666247-1090320165499356629"1⤵PID:1256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5ae8c5a35eea7026b14416e6aacc277b7
SHA1c6f1f222cd187ad7a9abad48e17611f21da89285
SHA2564bbfb5261bdb96f13a8de389b6a239fbddb0c1b7953d92dbc7ba4838c0b6a078
SHA51231a40ec9c597b0bfdeca9eefd5bdab9f65cfcd7764e4280dca41a1c29f4d880df376778c5263b3c94d60f7640ce26ad773b717afff956e29142139b0bcf5dfc3
-
Filesize
187KB
MD56642dbdbbf59d19128dbb830c922f7de
SHA1df4e8d89f492ba26cb0dac5c36da46da55d5a408
SHA256e11fa847de524e14af53919753061c43723b765877527f389ddd8aab68901938
SHA512ca57be8266e4134ad542c69444d29decb28eb562af4f2d93c834a189212e73f06f828706a139744115385cce8d10b402621677aafd732ebaa52b497ac6b62158