Analysis
-
max time kernel
151s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 11:26
Behavioral task
behavioral1
Sample
85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe
-
Size
132KB
-
MD5
85df87bbaa4b865175047ec06b8a4e7c
-
SHA1
cd556bbea6be04dd3608d39c27eacbc2463c74f4
-
SHA256
1c195f123314403488502df64fc92777fafd399bd4468a7ef499c5b009c4c5e0
-
SHA512
fecf644985ff7121504eb0db7ca33fda74e895c66d90110261168fe662ddfd67bccbddc90fc7e92d9a7ea0f4241d2da24356370687a2c177314404788781511d
-
SSDEEP
3072:Ro5xY9VjrFaLG9ID4HT0CwANauWoP7O19RlxXmNf9O69:m5EVjJa5AC78TOm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 820 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2948 ygfyh.exe -
Loads dropped DLL 2 IoCs
pid Process 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1612-0-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/files/0x002c000000018f80-6.dat upx behavioral1/memory/2948-15-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\{FFEC94F2-1266-4E9A-08F5-622A350117B5} = "C:\\Users\\Admin\\AppData\\Roaming\\Oxafn\\ygfyh.exe" ygfyh.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1612 set thread context of 820 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe 2948 ygfyh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe Token: SeSecurityPrivilege 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe Token: SeSecurityPrivilege 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2948 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 29 PID 1612 wrote to memory of 2948 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 29 PID 1612 wrote to memory of 2948 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 29 PID 1612 wrote to memory of 2948 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 29 PID 2948 wrote to memory of 1176 2948 ygfyh.exe 18 PID 2948 wrote to memory of 1176 2948 ygfyh.exe 18 PID 2948 wrote to memory of 1176 2948 ygfyh.exe 18 PID 2948 wrote to memory of 1176 2948 ygfyh.exe 18 PID 2948 wrote to memory of 1176 2948 ygfyh.exe 18 PID 2948 wrote to memory of 1288 2948 ygfyh.exe 19 PID 2948 wrote to memory of 1288 2948 ygfyh.exe 19 PID 2948 wrote to memory of 1288 2948 ygfyh.exe 19 PID 2948 wrote to memory of 1288 2948 ygfyh.exe 19 PID 2948 wrote to memory of 1288 2948 ygfyh.exe 19 PID 2948 wrote to memory of 1352 2948 ygfyh.exe 20 PID 2948 wrote to memory of 1352 2948 ygfyh.exe 20 PID 2948 wrote to memory of 1352 2948 ygfyh.exe 20 PID 2948 wrote to memory of 1352 2948 ygfyh.exe 20 PID 2948 wrote to memory of 1352 2948 ygfyh.exe 20 PID 2948 wrote to memory of 1248 2948 ygfyh.exe 24 PID 2948 wrote to memory of 1248 2948 ygfyh.exe 24 PID 2948 wrote to memory of 1248 2948 ygfyh.exe 24 PID 2948 wrote to memory of 1248 2948 ygfyh.exe 24 PID 2948 wrote to memory of 1248 2948 ygfyh.exe 24 PID 2948 wrote to memory of 1612 2948 ygfyh.exe 28 PID 2948 wrote to memory of 1612 2948 ygfyh.exe 28 PID 2948 wrote to memory of 1612 2948 ygfyh.exe 28 PID 2948 wrote to memory of 1612 2948 ygfyh.exe 28 PID 2948 wrote to memory of 1612 2948 ygfyh.exe 28 PID 1612 wrote to memory of 820 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 30 PID 1612 wrote to memory of 820 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 30 PID 1612 wrote to memory of 820 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 30 PID 1612 wrote to memory of 820 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 30 PID 1612 wrote to memory of 820 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 30 PID 1612 wrote to memory of 820 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 30 PID 1612 wrote to memory of 820 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 30 PID 1612 wrote to memory of 820 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 30 PID 1612 wrote to memory of 820 1612 85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe 30 PID 2948 wrote to memory of 1280 2948 ygfyh.exe 32 PID 2948 wrote to memory of 1280 2948 ygfyh.exe 32 PID 2948 wrote to memory of 1280 2948 ygfyh.exe 32 PID 2948 wrote to memory of 1280 2948 ygfyh.exe 32 PID 2948 wrote to memory of 1280 2948 ygfyh.exe 32 PID 2948 wrote to memory of 112 2948 ygfyh.exe 33 PID 2948 wrote to memory of 112 2948 ygfyh.exe 33 PID 2948 wrote to memory of 112 2948 ygfyh.exe 33 PID 2948 wrote to memory of 112 2948 ygfyh.exe 33 PID 2948 wrote to memory of 112 2948 ygfyh.exe 33
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1176
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1288
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\85df87bbaa4b865175047ec06b8a4e7c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Roaming\Oxafn\ygfyh.exe"C:\Users\Admin\AppData\Roaming\Oxafn\ygfyh.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpb28cbcab.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:820
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1248
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1280
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5aef887137adf803827e887ff77df39df
SHA1ce97ad077f8e4fc85b39cca882c41c8025282c59
SHA256ca511836860a39190d3a3e9c9cec91649651294e34aa33a9ea3455dbdd78d4f9
SHA512e86526c5d7bc3ea03b73ebd07034c75d560e680320df12f7b1cd43aa4a9aaf06ab2a788a3dac0a15efe519ab344cb4339ab7c55efa38a3f90c6e32754800f486
-
Filesize
380B
MD531f1909cc9442f66abe39d1b448d4827
SHA148ac89c4a783ea3d2d1aba25ef46ed235206e7be
SHA2563bc6360a8c8b3b30f44d062b0f46bd8b012b11e5f4bd0ee9518dab077b77f9eb
SHA51220a4feb3cf529cdeaaf0d2d3098973c4d98bffc686c557e05ad49f60daed352c04e994405174dec0b2ab02b6ba89eb8e14b5ba122b545c2b7ffb9498104394a1
-
Filesize
132KB
MD573164a651862279cd7681304b6e9e1c1
SHA1786f0956d9f78f2dd34399a25d3bd962f2786d02
SHA256ae54a70a1b2f64649ca6ca87176038ff2cf3f6a73871eed0a568a66d8123530b
SHA5128fb88d8c6da17eb9dc66862c892e5cb02f897ddf734b5b14b36eb97cfb4d4c6e94c6a7a48fa4f3e1a8ef812f2ce0f6a5e61df43479f64294145bc5becdea28f5