Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe
-
Size
297KB
-
MD5
8458a42f33ade9316bd386d569dac3ec
-
SHA1
7c441a42d73870c79547dab628b8263654042ea4
-
SHA256
ea84736f790d4d0968b3d0bf4cc70c63875bd130b6ed6375ee61f3f130b967ab
-
SHA512
09b6d74be06c1cab8fc39321b57c3a1ace912047853de039d7927615d27e3d77de1312ff0846ad53c88d336d3ceba34b0e4765c9d99c14bfb26a06a7b7b61925
-
SSDEEP
3072:Hpe7/PX0omWqLEnCYvcvIXRTy1hmUI0xlOcwXIvS3oGcFuG9hFoHk148GzMwZpf/:JiX5vDx8hzNxl8XIvSiFxTO8GzMi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2028 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2616 ceedo.exe -
Loads dropped DLL 1 IoCs
pid Process 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C6C07C68-68EF-AD4F-3837-F372201AD06F} = "C:\\Users\\Admin\\AppData\\Roaming\\Tolu\\ceedo.exe" ceedo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2932 set thread context of 2028 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceedo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Privacy 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe 2616 ceedo.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 2616 ceedo.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2616 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 30 PID 2932 wrote to memory of 2616 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 30 PID 2932 wrote to memory of 2616 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 30 PID 2932 wrote to memory of 2616 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 30 PID 2616 wrote to memory of 1120 2616 ceedo.exe 19 PID 2616 wrote to memory of 1120 2616 ceedo.exe 19 PID 2616 wrote to memory of 1120 2616 ceedo.exe 19 PID 2616 wrote to memory of 1120 2616 ceedo.exe 19 PID 2616 wrote to memory of 1120 2616 ceedo.exe 19 PID 2616 wrote to memory of 1176 2616 ceedo.exe 20 PID 2616 wrote to memory of 1176 2616 ceedo.exe 20 PID 2616 wrote to memory of 1176 2616 ceedo.exe 20 PID 2616 wrote to memory of 1176 2616 ceedo.exe 20 PID 2616 wrote to memory of 1176 2616 ceedo.exe 20 PID 2616 wrote to memory of 1236 2616 ceedo.exe 21 PID 2616 wrote to memory of 1236 2616 ceedo.exe 21 PID 2616 wrote to memory of 1236 2616 ceedo.exe 21 PID 2616 wrote to memory of 1236 2616 ceedo.exe 21 PID 2616 wrote to memory of 1236 2616 ceedo.exe 21 PID 2616 wrote to memory of 1212 2616 ceedo.exe 23 PID 2616 wrote to memory of 1212 2616 ceedo.exe 23 PID 2616 wrote to memory of 1212 2616 ceedo.exe 23 PID 2616 wrote to memory of 1212 2616 ceedo.exe 23 PID 2616 wrote to memory of 1212 2616 ceedo.exe 23 PID 2616 wrote to memory of 2932 2616 ceedo.exe 29 PID 2616 wrote to memory of 2932 2616 ceedo.exe 29 PID 2616 wrote to memory of 2932 2616 ceedo.exe 29 PID 2616 wrote to memory of 2932 2616 ceedo.exe 29 PID 2616 wrote to memory of 2932 2616 ceedo.exe 29 PID 2932 wrote to memory of 2028 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2028 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2028 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2028 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2028 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2028 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2028 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2028 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2028 2932 8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Roaming\Tolu\ceedo.exe"C:\Users\Admin\AppData\Roaming\Tolu\ceedo.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2616
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8918c1c3.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2028
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD579337e5079e0e706c49c3b986459b76a
SHA1e0b86531c33d80bbfae1fbc0a1cea4b7b39d569d
SHA256273c6dbb9f494f67a5108561b771ac888e1008cefe4bc9be64bec3a4fffc7582
SHA5125107ace1efdb912b5d573767d6a0e69a0bbb29ed943f2632acb71ce5f480433c9ea1032ab91ca2c73c1fb3e19ac62c82ce134425da7b1dcfe925b7b62a8db199
-
Filesize
297KB
MD5a9a8fada3d477481d314f93a2d682677
SHA1cba833d1aeeb83d2d1a826f4588a14844b01f8fe
SHA256f096ffe633551e78eca69c17c1a837ee96978cdd830d2670cbaec0a89550f05f
SHA512a49d742764b8accd2f684fc36229353b51e95c9ac3dd7cc0c70ff248943d28dae3e4540013c098cda3f384d50094681854d85e46a53343ce9cc67492744ad2ea