Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe
-
Size
292KB
-
MD5
87979f4810340fa4479e75a5357bb337
-
SHA1
9c930c02dd0f45071cdba89b5996d5094d49d9b0
-
SHA256
bcbb6058b0cab0deb6492a5d9ed251885ee832cde6a4ba04e73dd9bc349b8e64
-
SHA512
9ce3cb4752a6ec3895467b93ae357faef50c7dd0043facdeae3a0d54097feef1e13ea63cd15ad293fb125511beb14aa867b1d29e42333052216e4512c8e1b766
-
SSDEEP
6144:/X1lvdqWLqOK+/B5RyaynzgvGq6JhW7PQgtm0DTN2:/X1/zLX/B5YzFHstmH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2632 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2400 gyryu.exe -
Loads dropped DLL 2 IoCs
pid Process 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\{36F482E8-6FE9-AD4F-5F98-37194FCB1404} = "C:\\Users\\Admin\\AppData\\Roaming\\Ixmyx\\gyryu.exe" gyryu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1656 set thread context of 2632 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Privacy 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe 2400 gyryu.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe Token: SeSecurityPrivilege 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe Token: SeSecurityPrivilege 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 2400 gyryu.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2400 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 31 PID 1656 wrote to memory of 2400 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 31 PID 1656 wrote to memory of 2400 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 31 PID 1656 wrote to memory of 2400 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 31 PID 2400 wrote to memory of 1072 2400 gyryu.exe 18 PID 2400 wrote to memory of 1072 2400 gyryu.exe 18 PID 2400 wrote to memory of 1072 2400 gyryu.exe 18 PID 2400 wrote to memory of 1072 2400 gyryu.exe 18 PID 2400 wrote to memory of 1072 2400 gyryu.exe 18 PID 2400 wrote to memory of 1152 2400 gyryu.exe 20 PID 2400 wrote to memory of 1152 2400 gyryu.exe 20 PID 2400 wrote to memory of 1152 2400 gyryu.exe 20 PID 2400 wrote to memory of 1152 2400 gyryu.exe 20 PID 2400 wrote to memory of 1152 2400 gyryu.exe 20 PID 2400 wrote to memory of 1184 2400 gyryu.exe 21 PID 2400 wrote to memory of 1184 2400 gyryu.exe 21 PID 2400 wrote to memory of 1184 2400 gyryu.exe 21 PID 2400 wrote to memory of 1184 2400 gyryu.exe 21 PID 2400 wrote to memory of 1184 2400 gyryu.exe 21 PID 2400 wrote to memory of 2012 2400 gyryu.exe 23 PID 2400 wrote to memory of 2012 2400 gyryu.exe 23 PID 2400 wrote to memory of 2012 2400 gyryu.exe 23 PID 2400 wrote to memory of 2012 2400 gyryu.exe 23 PID 2400 wrote to memory of 2012 2400 gyryu.exe 23 PID 2400 wrote to memory of 1656 2400 gyryu.exe 30 PID 2400 wrote to memory of 1656 2400 gyryu.exe 30 PID 2400 wrote to memory of 1656 2400 gyryu.exe 30 PID 2400 wrote to memory of 1656 2400 gyryu.exe 30 PID 2400 wrote to memory of 1656 2400 gyryu.exe 30 PID 1656 wrote to memory of 2632 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 32 PID 1656 wrote to memory of 2632 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 32 PID 1656 wrote to memory of 2632 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 32 PID 1656 wrote to memory of 2632 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 32 PID 1656 wrote to memory of 2632 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 32 PID 1656 wrote to memory of 2632 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 32 PID 1656 wrote to memory of 2632 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 32 PID 1656 wrote to memory of 2632 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 32 PID 1656 wrote to memory of 2632 1656 87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1072
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1152
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\87979f4810340fa4479e75a5357bb337_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Roaming\Ixmyx\gyryu.exe"C:\Users\Admin\AppData\Roaming\Ixmyx\gyryu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2400
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp783d9a59.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2632
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5782cef3276d52570adef53891aa67ab6
SHA162693e6cc57a6eada36643a9244aba9283473f93
SHA256f29d86af5cc4374a6d2f286311e302776c8c22a884df35e4dd6e6abd3927c8df
SHA5124cb6d864110c73dc6be873cb74ad0e567ab5939ac7f86442b82b7cc3dc96e53689855d85154ba78dc68850da93f7935dcccd32f509688ec74a4d864e45fe2eef
-
Filesize
380B
MD59d6c45621380b14ce77b9a45d2c2820f
SHA1ff937feda0a13d354aed7a94a9ee732e311ea68c
SHA256af00a2dbc9b28da18b75655891908536f54a8375937373b2864131571f85cc67
SHA51237c9486fce5c570724d8116cec2a8e33c34c9879d27c6b9ab8c525f9c91388b3cc9bef013e00ffe387260492b7e59cb0411e84e22b9fb32b4d5b56ff3725cbcc
-
Filesize
292KB
MD5c07636ecf10f1e411c7c38798a001387
SHA12d28d3f9157d91b48d898bf2a531652596cfbb73
SHA256ecfd63b9dc15d876a51eeb0da276df6d2ca8ce37380c45e1fb9ae05093b5f080
SHA5129cd59290e54831028bce47b8169c3c02b7c7ec768a1ef2214043323970c5fdda0318f0dd7a553396516805c85314cd3400a81b306d646579ade7e09e9157a88d