Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe
-
Size
335KB
-
MD5
89f474a9ec5b54bdbd34d5509bed52b4
-
SHA1
d92c195c20ffb20a46a419ad11581b6a08823e57
-
SHA256
80c7cc118b0b0ad39f300126f3ce24f0aece9ef318a92f6f58e137d77a2b6884
-
SHA512
c3da36b85efc932f73f65e349d64e6d57c3343fdcfb33fd52650d0dacba6f1f1a0b54f6c36645f41942e957f47aa5a30f8e95d980214f2c6fadb45d43638af58
-
SSDEEP
6144:7DXDt/EzOLSHNypS90GMcWBRBiPo7K03RHxZifv/c4/yhRjpLBnxBZsqcg:7DXDtG8SgGMcyjiA7zBHxZFpZZss
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2596 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2960 pyhoqo.exe 2708 pyhoqo.exe -
Loads dropped DLL 2 IoCs
pid Process 2368 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 2368 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\{09E0E5E8-6808-AD4F-43B0-714965AC5254} = "C:\\Users\\Admin\\AppData\\Roaming\\Ezqen\\pyhoqo.exe" pyhoqo.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1488 set thread context of 2368 1488 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 30 PID 2960 set thread context of 2708 2960 pyhoqo.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pyhoqo.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Privacy cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe 2708 pyhoqo.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2368 1488 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 30 PID 1488 wrote to memory of 2368 1488 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 30 PID 1488 wrote to memory of 2368 1488 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 30 PID 1488 wrote to memory of 2368 1488 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 30 PID 1488 wrote to memory of 2368 1488 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 30 PID 1488 wrote to memory of 2368 1488 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 30 PID 1488 wrote to memory of 2368 1488 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 30 PID 1488 wrote to memory of 2368 1488 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 30 PID 1488 wrote to memory of 2368 1488 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 30 PID 2368 wrote to memory of 2960 2368 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 32 PID 2368 wrote to memory of 2960 2368 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 32 PID 2368 wrote to memory of 2960 2368 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 32 PID 2368 wrote to memory of 2960 2368 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 32 PID 2960 wrote to memory of 2708 2960 pyhoqo.exe 33 PID 2960 wrote to memory of 2708 2960 pyhoqo.exe 33 PID 2960 wrote to memory of 2708 2960 pyhoqo.exe 33 PID 2960 wrote to memory of 2708 2960 pyhoqo.exe 33 PID 2960 wrote to memory of 2708 2960 pyhoqo.exe 33 PID 2960 wrote to memory of 2708 2960 pyhoqo.exe 33 PID 2960 wrote to memory of 2708 2960 pyhoqo.exe 33 PID 2960 wrote to memory of 2708 2960 pyhoqo.exe 33 PID 2960 wrote to memory of 2708 2960 pyhoqo.exe 33 PID 2708 wrote to memory of 1100 2708 pyhoqo.exe 19 PID 2708 wrote to memory of 1100 2708 pyhoqo.exe 19 PID 2708 wrote to memory of 1100 2708 pyhoqo.exe 19 PID 2708 wrote to memory of 1100 2708 pyhoqo.exe 19 PID 2708 wrote to memory of 1100 2708 pyhoqo.exe 19 PID 2708 wrote to memory of 1152 2708 pyhoqo.exe 20 PID 2708 wrote to memory of 1152 2708 pyhoqo.exe 20 PID 2708 wrote to memory of 1152 2708 pyhoqo.exe 20 PID 2708 wrote to memory of 1152 2708 pyhoqo.exe 20 PID 2708 wrote to memory of 1152 2708 pyhoqo.exe 20 PID 2708 wrote to memory of 1184 2708 pyhoqo.exe 21 PID 2708 wrote to memory of 1184 2708 pyhoqo.exe 21 PID 2708 wrote to memory of 1184 2708 pyhoqo.exe 21 PID 2708 wrote to memory of 1184 2708 pyhoqo.exe 21 PID 2708 wrote to memory of 1184 2708 pyhoqo.exe 21 PID 2708 wrote to memory of 836 2708 pyhoqo.exe 23 PID 2708 wrote to memory of 836 2708 pyhoqo.exe 23 PID 2708 wrote to memory of 836 2708 pyhoqo.exe 23 PID 2708 wrote to memory of 836 2708 pyhoqo.exe 23 PID 2708 wrote to memory of 836 2708 pyhoqo.exe 23 PID 2708 wrote to memory of 2368 2708 pyhoqo.exe 30 PID 2708 wrote to memory of 2368 2708 pyhoqo.exe 30 PID 2708 wrote to memory of 2368 2708 pyhoqo.exe 30 PID 2708 wrote to memory of 2368 2708 pyhoqo.exe 30 PID 2708 wrote to memory of 2368 2708 pyhoqo.exe 30 PID 2368 wrote to memory of 2596 2368 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 34 PID 2368 wrote to memory of 2596 2368 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 34 PID 2368 wrote to memory of 2596 2368 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 34 PID 2368 wrote to memory of 2596 2368 89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe 34 PID 2708 wrote to memory of 2596 2708 pyhoqo.exe 34 PID 2708 wrote to memory of 2596 2708 pyhoqo.exe 34 PID 2708 wrote to memory of 2596 2708 pyhoqo.exe 34 PID 2708 wrote to memory of 2596 2708 pyhoqo.exe 34 PID 2708 wrote to memory of 2596 2708 pyhoqo.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1152
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89f474a9ec5b54bdbd34d5509bed52b4_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Roaming\Ezqen\pyhoqo.exe"C:\Users\Admin\AppData\Roaming\Ezqen\pyhoqo.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Roaming\Ezqen\pyhoqo.exe"C:\Users\Admin\AppData\Roaming\Ezqen\pyhoqo.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp34005514.bat"4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2596
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD566cb1c16209b9a6b19d55c91d941356f
SHA11d170ba8cc303af3cfa71ac641916167ecd09ddf
SHA256e378538f2b9263e6b8736c708736241dae0752d222a6eb785b6dad5136e93d40
SHA5121b8a694c68bfe785f32cd7b0c9f8f2e4d7def8c510058d17dc3127bba4fbe5d17865fd776eb8364d4cd80d0780d27f5078920cc4ecbc958fd13ee07b3e22bce7
-
Filesize
335KB
MD52d1914bfbdf9ed35ec5afb4566974a04
SHA1e57f80ccdbce94bf8d2466d34c3574987cb698f2
SHA25619eb86c445d1d207183a18ff24fcc229d5845f5e3637f419dd01cf2b7c9576b4
SHA512bb96d8aa4c290d5720a909a70f86b4039997099d237fa5c91231816acba87008d0db2f387a133e18d6cad3e4f7381e47682d8baf53abb1aec4948257271af168