Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
89ec96e9a77d8ef3ae1885e6206448ea
-
SHA1
e2fd242f5578c48fd6a093ffbf425bacf535c8ae
-
SHA256
5a63e3e9b77a15373809956adf9173643eb3183b47fafd9233df28b6e3f0505d
-
SHA512
676b25dae7ded8db115644b9b7a0eb12c5a37b2fd525765d74fd7714e5ea6e104b374bbe5eb55148f08ecf3955ff89c041914f0180f28b5626dbf615cf8911da
-
SSDEEP
49152:HAb8dSH+hNGUwqvjdVyFM545r/mgnogj7za2m89Iiw7yANDAdaCXmFh5+PV5+PHq:gbGwdqvjdVyFM545r/mgn/j7za2m89I+
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4076 dllhost.exe 1032 KoxpTT_v43.exe -
Loads dropped DLL 4 IoCs
pid Process 4076 dllhost.exe 4076 dllhost.exe 1032 KoxpTT_v43.exe 1032 KoxpTT_v43.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DLLHost = "\"C:\\Users\\Admin\\AppData\\Roaming\\dllhost.exe\"" reg.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1236 4076 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KoxpTT_v43.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2092 reg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 976 89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 976 89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4076 dllhost.exe Token: SeIncBasePriorityPrivilege 976 89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4076 dllhost.exe 1032 KoxpTT_v43.exe 1032 KoxpTT_v43.exe 1032 KoxpTT_v43.exe 1032 KoxpTT_v43.exe 1032 KoxpTT_v43.exe 1032 KoxpTT_v43.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 976 wrote to memory of 4076 976 89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe 89 PID 976 wrote to memory of 4076 976 89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe 89 PID 976 wrote to memory of 4076 976 89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe 89 PID 4076 wrote to memory of 2532 4076 dllhost.exe 90 PID 4076 wrote to memory of 2532 4076 dllhost.exe 90 PID 4076 wrote to memory of 2532 4076 dllhost.exe 90 PID 2532 wrote to memory of 4356 2532 cmd.exe 92 PID 2532 wrote to memory of 4356 2532 cmd.exe 92 PID 2532 wrote to memory of 4356 2532 cmd.exe 92 PID 4356 wrote to memory of 2092 4356 cmd.exe 93 PID 4356 wrote to memory of 2092 4356 cmd.exe 93 PID 4356 wrote to memory of 2092 4356 cmd.exe 93 PID 976 wrote to memory of 1032 976 89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe 94 PID 976 wrote to memory of 1032 976 89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe 94 PID 976 wrote to memory of 1032 976 89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89ec96e9a77d8ef3ae1885e6206448ea_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Roaming\dllhost.exeC:\Users\Admin\AppData\Roaming\dllhost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c system.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V DLLHost /D "\"C:\Users\Admin\AppData\Roaming\dllhost.exe\"" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V DLLHost /D "\"C:\Users\Admin\AppData\Roaming\dllhost.exe\"" /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2092
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 7323⤵
- Program crash
PID:1236
-
-
-
C:\Users\Admin\AppData\Roaming\KoxpTT_v43.exeC:\Users\Admin\AppData\Roaming\KoxpTT_v43.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4076 -ip 40761⤵PID:4140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD528f4505278ee06a7206d6056903ca5b6
SHA17c882c069096696a15976bee74f0922f81aa38ae
SHA2560f63764b7a66b7436fc4f67d6d8e28a4b844643bb78adc1330a552d8421b8a88
SHA512ca81dae7a6fc531c2fb9170cba6ffe8669b1bd7907396c735c72951e57960070d2c2e668efad714b2391c3f3bfc04efd84fb7046a587d7ddb6b2b5248869dd0c
-
Filesize
368KB
MD5cbe4d919e88a9b079e1f4be1cf04de46
SHA1c92c4f8521fb32cfbeddb6eaccd013805f9faaeb
SHA2562b866192e02f32a241f1ac0f259b2ed2fa21b8e7fb0cf29eae5b02a1043fc200
SHA512292bf9337a367eb62292a3f50945c751333d6df934656ee12301c14d7881b10711fc87a6506a8e9a02cdf55629d663f956b6cab3fc5e6eb0a4871ea9c6ee8046
-
Filesize
693KB
MD5fa49a616303b6854cc51bc9bf5b475f9
SHA196ff3446f33b11c0c6d2fd244f028d2127a7fab1
SHA256852f3020934ba83e21be6e4884750e14ea09d96511225ab871fc0cf166ae7cdb
SHA512fb27820f4fab3bd3b4a54d7ea870a122592beb804d3112d675ed2d0dce03b986e110edfaa0ed03791e0be4477275b20492b835c281aac06856cdd0e25fe89d42
-
Filesize
457KB
MD52f856ba5cab53b5cdfe4e3cc7ebfc624
SHA104c168d95a32966bf05eb52850a0e6372ad8a7c1
SHA256c71b7742e0f4fbeb55bedf2b41e41225c28cd00c91bd7021c700069c1d24384d
SHA512df5566feb26cfe1a1df9a25c07452e2c6cda773c1b91ce1808cce3244db272b4e445698d5703d6d6b7db98888a1e09840c9d497d61d7974e530571713a6d85d6