Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 00:43
Behavioral task
behavioral1
Sample
885539e00198ee4f1088d779692221dd_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
885539e00198ee4f1088d779692221dd_JaffaCakes118.exe
-
Size
92KB
-
MD5
885539e00198ee4f1088d779692221dd
-
SHA1
db0650adfdfc452f9d1aea22203bff45de7dc5aa
-
SHA256
f897eea751b79f2356f1d00a88cdec4b19b31052bbdd881eff3073649c7b1100
-
SHA512
5760a75db10667df01f0113b59fd110daf607f3f2876a8729515786d6e66c5e6191595f218e8723f5ec942b92a62e93af42db94ebc3b96bb2f5a65732818c56c
-
SSDEEP
1536:bKoGLsP+d7P/s4YxRoA+mt9W7XQpF3Ej9GQD9niRIkPMPGLVu+a0jbCew3hQVU2H:bkw6/65+mXQQfUYQxBSMMEMhbLErZi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 280 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 etnir.exe -
Loads dropped DLL 2 IoCs
pid Process 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1512-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/files/0x0008000000016d28-6.dat upx behavioral1/memory/2420-15-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\{1DF456E8-E7B1-772F-2BD0-1E5EEE48C9BE} = "C:\\Users\\Admin\\AppData\\Roaming\\Rosiy\\etnir.exe" etnir.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1512 set thread context of 280 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language etnir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe 2420 etnir.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe Token: SeSecurityPrivilege 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe Token: SeSecurityPrivilege 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2420 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 30 PID 1512 wrote to memory of 2420 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 30 PID 1512 wrote to memory of 2420 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 30 PID 1512 wrote to memory of 2420 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 30 PID 2420 wrote to memory of 1160 2420 etnir.exe 19 PID 2420 wrote to memory of 1160 2420 etnir.exe 19 PID 2420 wrote to memory of 1160 2420 etnir.exe 19 PID 2420 wrote to memory of 1160 2420 etnir.exe 19 PID 2420 wrote to memory of 1160 2420 etnir.exe 19 PID 2420 wrote to memory of 1252 2420 etnir.exe 20 PID 2420 wrote to memory of 1252 2420 etnir.exe 20 PID 2420 wrote to memory of 1252 2420 etnir.exe 20 PID 2420 wrote to memory of 1252 2420 etnir.exe 20 PID 2420 wrote to memory of 1252 2420 etnir.exe 20 PID 2420 wrote to memory of 1300 2420 etnir.exe 21 PID 2420 wrote to memory of 1300 2420 etnir.exe 21 PID 2420 wrote to memory of 1300 2420 etnir.exe 21 PID 2420 wrote to memory of 1300 2420 etnir.exe 21 PID 2420 wrote to memory of 1300 2420 etnir.exe 21 PID 2420 wrote to memory of 1660 2420 etnir.exe 25 PID 2420 wrote to memory of 1660 2420 etnir.exe 25 PID 2420 wrote to memory of 1660 2420 etnir.exe 25 PID 2420 wrote to memory of 1660 2420 etnir.exe 25 PID 2420 wrote to memory of 1660 2420 etnir.exe 25 PID 2420 wrote to memory of 1512 2420 etnir.exe 29 PID 2420 wrote to memory of 1512 2420 etnir.exe 29 PID 2420 wrote to memory of 1512 2420 etnir.exe 29 PID 2420 wrote to memory of 1512 2420 etnir.exe 29 PID 2420 wrote to memory of 1512 2420 etnir.exe 29 PID 1512 wrote to memory of 280 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 31 PID 1512 wrote to memory of 280 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 31 PID 1512 wrote to memory of 280 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 31 PID 1512 wrote to memory of 280 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 31 PID 1512 wrote to memory of 280 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 31 PID 1512 wrote to memory of 280 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 31 PID 1512 wrote to memory of 280 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 31 PID 1512 wrote to memory of 280 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 31 PID 1512 wrote to memory of 280 1512 885539e00198ee4f1088d779692221dd_JaffaCakes118.exe 31 PID 2420 wrote to memory of 2880 2420 etnir.exe 33 PID 2420 wrote to memory of 2880 2420 etnir.exe 33 PID 2420 wrote to memory of 2880 2420 etnir.exe 33 PID 2420 wrote to memory of 2880 2420 etnir.exe 33 PID 2420 wrote to memory of 2880 2420 etnir.exe 33 PID 2420 wrote to memory of 2076 2420 etnir.exe 34 PID 2420 wrote to memory of 2076 2420 etnir.exe 34 PID 2420 wrote to memory of 2076 2420 etnir.exe 34 PID 2420 wrote to memory of 2076 2420 etnir.exe 34 PID 2420 wrote to memory of 2076 2420 etnir.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1160
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1252
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\885539e00198ee4f1088d779692221dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\885539e00198ee4f1088d779692221dd_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Roaming\Rosiy\etnir.exe"C:\Users\Admin\AppData\Roaming\Rosiy\etnir.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd067d055.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:280
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1660
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2880
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD563d549be5bd88e99cec2fa762785f175
SHA142203d08aa944f729a2da3ba60ab807fdb3c420d
SHA2560dcf75cb3d2ddc2366b523d785d9ca780c3129f7de622d975262a5543ce8eba9
SHA512c2a86d06f5c924ea283a01979d5f7d360e08f6e85ad657345fc5e861f7bdf142503053dd99d789d2c30e70c16178d5efa6aa0db1e15194f1470b4b384c922cc3
-
Filesize
380B
MD588c9b22298276f7509ed496a2709ae9e
SHA1386d0628e6083e340cdff767382c8fc1b25538d9
SHA256f49b50a346454e7cb7d8b7388e5077e5d924760443e2f4ebf5a59cdd0a9da1b1
SHA512466039c73f74246abe86a6ffb3c2d5ff1a35abb69c246db339777f917ad416c04283bc91c4bd9e1aab55a8941ca28acbd4d6863a9d67287996fb148d8477c8ac
-
Filesize
92KB
MD50eea5b7f7e1766cbfcb821c882b1a4c9
SHA17c703dadf969b5f1b9d9b7d33fc362f10daed3ed
SHA2560a014907e208ea0439864e6aa3a029de81e55eca05451e6bcdc77e905665a652
SHA512f8e07e4f896ee8c089499b3fc7cb6969982f660b826f4d3846741b8cea1f5b239fb97fe39b63ed6f51adae419109fd051762b8d1b2520abafde235633edd8d02