Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe
-
Size
284KB
-
MD5
829d4a95f2db34c695ac1a5f06bfe050
-
SHA1
487a0c45611ddc440411ebd931b213fad2bf346a
-
SHA256
3723c6b7f6b1446da170e055dbbb4c048e07001ab838d16648a6b06f014f439b
-
SHA512
7743308dd12d36364c9d7a1ef973a60faf82ee6b0fbba5ca7549b6a551fc4a3bb538c17acda3d977e7a878b363934c472dc5070eece736a352feceedc4b544eb
-
SSDEEP
6144:8jJQFdnwLtxP+jHR8h2Rao9LyFsvNbi/O1Pr/V9P3I5:MQbMxP+jHRzXLyFsFbgOBN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1308 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2492 sakav.exe -
Loads dropped DLL 2 IoCs
pid Process 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F4363D88-6FEF-AD4F-FCEF-4765F9626478} = "C:\\Users\\Admin\\AppData\\Roaming\\Uxar\\sakav.exe" sakav.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1968 set thread context of 1308 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sakav.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Privacy 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe 2492 sakav.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe Token: SeSecurityPrivilege 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe Token: SeSecurityPrivilege 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 2492 sakav.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2492 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 30 PID 1968 wrote to memory of 2492 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 30 PID 1968 wrote to memory of 2492 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 30 PID 1968 wrote to memory of 2492 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 30 PID 2492 wrote to memory of 1096 2492 sakav.exe 19 PID 2492 wrote to memory of 1096 2492 sakav.exe 19 PID 2492 wrote to memory of 1096 2492 sakav.exe 19 PID 2492 wrote to memory of 1096 2492 sakav.exe 19 PID 2492 wrote to memory of 1096 2492 sakav.exe 19 PID 2492 wrote to memory of 1152 2492 sakav.exe 20 PID 2492 wrote to memory of 1152 2492 sakav.exe 20 PID 2492 wrote to memory of 1152 2492 sakav.exe 20 PID 2492 wrote to memory of 1152 2492 sakav.exe 20 PID 2492 wrote to memory of 1152 2492 sakav.exe 20 PID 2492 wrote to memory of 1196 2492 sakav.exe 21 PID 2492 wrote to memory of 1196 2492 sakav.exe 21 PID 2492 wrote to memory of 1196 2492 sakav.exe 21 PID 2492 wrote to memory of 1196 2492 sakav.exe 21 PID 2492 wrote to memory of 1196 2492 sakav.exe 21 PID 2492 wrote to memory of 1388 2492 sakav.exe 24 PID 2492 wrote to memory of 1388 2492 sakav.exe 24 PID 2492 wrote to memory of 1388 2492 sakav.exe 24 PID 2492 wrote to memory of 1388 2492 sakav.exe 24 PID 2492 wrote to memory of 1388 2492 sakav.exe 24 PID 2492 wrote to memory of 1968 2492 sakav.exe 29 PID 2492 wrote to memory of 1968 2492 sakav.exe 29 PID 2492 wrote to memory of 1968 2492 sakav.exe 29 PID 2492 wrote to memory of 1968 2492 sakav.exe 29 PID 2492 wrote to memory of 1968 2492 sakav.exe 29 PID 1968 wrote to memory of 1308 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 31 PID 1968 wrote to memory of 1308 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 31 PID 1968 wrote to memory of 1308 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 31 PID 1968 wrote to memory of 1308 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 31 PID 1968 wrote to memory of 1308 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 31 PID 1968 wrote to memory of 1308 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 31 PID 1968 wrote to memory of 1308 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 31 PID 1968 wrote to memory of 1308 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 31 PID 1968 wrote to memory of 1308 1968 829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1096
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1152
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\829d4a95f2db34c695ac1a5f06bfe050_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\Uxar\sakav.exe"C:\Users\Admin\AppData\Roaming\Uxar\sakav.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2492
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp80fdbdfa.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1308
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5a8cfbbb969270c8da855b01624181408
SHA1032772fa28954476138f2b3b6e4e616dcd2524b5
SHA256b0098a8c369bbd3d6f5d93c265f837613edf983fd092ce6a24242ec7c0fc5296
SHA512c262d7a22f232c3bd4eddc63faeea5a502106750965e9abd819a74ee90dc2998db7f4346ae01007ff2afee66c02f4c21af0c667a0fa1af0e41325e9a694b8ef2
-
Filesize
380B
MD5ea9e7625902c123dc9540713a068a3b7
SHA115295aad2cfa4379276ffc670e6ce55fee217cae
SHA2562a85027998f47522e6996e62bc551a016bc6f808d507a376304f02183d53606b
SHA512f1ca4d606f41d594a4237d743796aca7a07758aff71a095b8f23486ad58bdf52a4cbaa320f7e488309984cc076e791cbf474d74e5f0d52d7bfc047baa3bda351
-
Filesize
284KB
MD583bc7131a764bf51b9747a65c7f18bc0
SHA1dcafe007c7e61bee1546544c095cfb28e223e6e0
SHA2569ebb56a2c3aebc571cf0f63d53c2c13a8017be310342569b66fa098d43f41d6e
SHA512a1dfb64440e425c5163a67b01a87fbca9f096d56e95b4ab9b289b0bfc5308bd25662b236bee94ffacafeba2be44d365bcf0e967e8be3e5cf1ebec6a00a2b303d