Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 02:50
Behavioral task
behavioral1
Sample
88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe
-
Size
364KB
-
MD5
88b328a1ccd518514da2fe88c61bfee2
-
SHA1
594b94463da34d5b23068a0c37197989728a243a
-
SHA256
0fd0899e365646ef59c5971addf8666f066015bfe400d7977291ebb145f9937e
-
SHA512
cc16ea812fa3deac3418e1c48a6eef398f609958178ccc85152a91f90d48796f9aef0c7c32a6350fab96fee742f97d47dc29347296fd126d921ed8bb16ba1d08
-
SSDEEP
6144:Xn8ukcbLviSGqJjW8lE0crUTMX+82IXpW0vH66RVas3Gmxq2/2eW/ZDUp/fIIbGi:Xn8HcbL6Sdvu0YUTk1ZW0vH66vW92/Cu
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2856 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
moarg.exepid Process 2772 moarg.exe -
Loads dropped DLL 2 IoCs
Processes:
88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exepid Process 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/files/0x00080000000186f3-12.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
moarg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C4A05C48-6809-AD4F-9B76-1BFCA18838E1} = "C:\\Users\\Admin\\AppData\\Roaming\\Ipgay\\moarg.exe" moarg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exedescription pid Process procid_target PID 2660 set thread context of 2856 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Processes:
88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
moarg.exepid Process 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe 2772 moarg.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exedescription pid Process Token: SeSecurityPrivilege 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe Token: SeSecurityPrivilege 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe Token: SeSecurityPrivilege 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exemoarg.exedescription pid Process procid_target PID 2660 wrote to memory of 2772 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2772 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2772 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2772 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 30 PID 2772 wrote to memory of 1100 2772 moarg.exe 19 PID 2772 wrote to memory of 1100 2772 moarg.exe 19 PID 2772 wrote to memory of 1100 2772 moarg.exe 19 PID 2772 wrote to memory of 1100 2772 moarg.exe 19 PID 2772 wrote to memory of 1100 2772 moarg.exe 19 PID 2772 wrote to memory of 1172 2772 moarg.exe 20 PID 2772 wrote to memory of 1172 2772 moarg.exe 20 PID 2772 wrote to memory of 1172 2772 moarg.exe 20 PID 2772 wrote to memory of 1172 2772 moarg.exe 20 PID 2772 wrote to memory of 1172 2772 moarg.exe 20 PID 2772 wrote to memory of 1228 2772 moarg.exe 21 PID 2772 wrote to memory of 1228 2772 moarg.exe 21 PID 2772 wrote to memory of 1228 2772 moarg.exe 21 PID 2772 wrote to memory of 1228 2772 moarg.exe 21 PID 2772 wrote to memory of 1228 2772 moarg.exe 21 PID 2772 wrote to memory of 2028 2772 moarg.exe 23 PID 2772 wrote to memory of 2028 2772 moarg.exe 23 PID 2772 wrote to memory of 2028 2772 moarg.exe 23 PID 2772 wrote to memory of 2028 2772 moarg.exe 23 PID 2772 wrote to memory of 2028 2772 moarg.exe 23 PID 2772 wrote to memory of 2660 2772 moarg.exe 29 PID 2772 wrote to memory of 2660 2772 moarg.exe 29 PID 2772 wrote to memory of 2660 2772 moarg.exe 29 PID 2772 wrote to memory of 2660 2772 moarg.exe 29 PID 2772 wrote to memory of 2660 2772 moarg.exe 29 PID 2660 wrote to memory of 2856 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2856 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2856 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2856 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2856 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2856 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2856 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2856 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2856 2660 88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\88b328a1ccd518514da2fe88c61bfee2_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Roaming\Ipgay\moarg.exe"C:\Users\Admin\AppData\Roaming\Ipgay\moarg.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp34614c6b.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5660218214ac46528e4de7de47b04d2e6
SHA165198d2f911585d8d5b1397be495a31ad93160b7
SHA256eafcc194d5c56e6df9c83e24b73482a13e85222ed8ccae308674626a32e2744d
SHA5129ad124716a52dc997b42e62f058d237045a109c9ea6797ab07366f49e815753e243682201df6be9c11f48a7edf75dd94d72f8c3a53ec6b11627928db08755cd6
-
Filesize
364KB
MD5dd8e02ed99059645ed3a37508505ae8e
SHA16c56f57d7eb100cd6f9327a49818b2d96f24eed7
SHA2560d862533bb07306db12393d98d6c142c15ecdfd01ce1be79e1cff56f5aa9ab08
SHA5121269d65845a65b182bf212fe9350408b1463ebdae69b1c3c449f6a04bb764472b5b12c328ce989ba4ee26bc87b3a48f51e4d2ffd66f922c671f817f14c85e2d5
-
Filesize
380B
MD537abb45297a5a7767d96bd5bf887f0ff
SHA18fde7399d9850983e323525936d9a983a8992289
SHA2561966d22873baf5a36d4f89620811e34bfed1135373e6ec59b8cf0ea1effc16b2
SHA51224c0fe3e89f5364ec4fb5b0dadcd2f07cebc15486b7e7e15b83fd6d4896cdc0bc6472543ed6445029d8073fc028fea91e41be4d5c2139925b58feaa991ff0e0e