Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 11:24
Static task
static1
Behavioral task
behavioral1
Sample
8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe
-
Size
305KB
-
MD5
8a2cfdbb5e2ff32fe534afc845cc2a8a
-
SHA1
cfc16a4db58ed908df02f19c1fa13f7658ee9e61
-
SHA256
ef76e6e30d6b4a62c14488e093a048e7aef23ac6ac043badd10fab56148cce61
-
SHA512
52b55847cd6916be96040d91f8f587934ca2801a371da93b2f23c5bd1345f94b74af8f86d95b8f4f63db010eeee0b097c7482c434cbe2fc2eaa78b60efea919e
-
SSDEEP
6144:5GSzUfT72Y0SczinYKTY1SQshfRPVQe1MZkIYSccr7wbstOKPECYeixlYGicg:5GqU77SSfYsY1UMqMZJYSN7wbstOK8fi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2724 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2748 qyexx.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7D4B5FC8-1892-AD4F-C2C5-7543D4B4565E} = "C:\\Users\\Admin\\AppData\\Roaming\\Towawi\\qyexx.exe" qyexx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2100 set thread context of 2724 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qyexx.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Privacy 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe 2748 qyexx.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2748 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2748 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2748 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2748 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe 30 PID 2748 wrote to memory of 1108 2748 qyexx.exe 19 PID 2748 wrote to memory of 1108 2748 qyexx.exe 19 PID 2748 wrote to memory of 1108 2748 qyexx.exe 19 PID 2748 wrote to memory of 1108 2748 qyexx.exe 19 PID 2748 wrote to memory of 1108 2748 qyexx.exe 19 PID 2748 wrote to memory of 1168 2748 qyexx.exe 20 PID 2748 wrote to memory of 1168 2748 qyexx.exe 20 PID 2748 wrote to memory of 1168 2748 qyexx.exe 20 PID 2748 wrote to memory of 1168 2748 qyexx.exe 20 PID 2748 wrote to memory of 1168 2748 qyexx.exe 20 PID 2748 wrote to memory of 1252 2748 qyexx.exe 21 PID 2748 wrote to memory of 1252 2748 qyexx.exe 21 PID 2748 wrote to memory of 1252 2748 qyexx.exe 21 PID 2748 wrote to memory of 1252 2748 qyexx.exe 21 PID 2748 wrote to memory of 1252 2748 qyexx.exe 21 PID 2748 wrote to memory of 1036 2748 qyexx.exe 25 PID 2748 wrote to memory of 1036 2748 qyexx.exe 25 PID 2748 wrote to memory of 1036 2748 qyexx.exe 25 PID 2748 wrote to memory of 1036 2748 qyexx.exe 25 PID 2748 wrote to memory of 1036 2748 qyexx.exe 25 PID 2748 wrote to memory of 2100 2748 qyexx.exe 29 PID 2748 wrote to memory of 2100 2748 qyexx.exe 29 PID 2748 wrote to memory of 2100 2748 qyexx.exe 29 PID 2748 wrote to memory of 2100 2748 qyexx.exe 29 PID 2748 wrote to memory of 2100 2748 qyexx.exe 29 PID 2100 wrote to memory of 2724 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2724 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2724 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2724 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2724 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2724 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2724 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2724 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2724 2100 8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2720 2748 qyexx.exe 33 PID 2748 wrote to memory of 2720 2748 qyexx.exe 33 PID 2748 wrote to memory of 2720 2748 qyexx.exe 33 PID 2748 wrote to memory of 2720 2748 qyexx.exe 33 PID 2748 wrote to memory of 2720 2748 qyexx.exe 33
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a2cfdbb5e2ff32fe534afc845cc2a8a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Roaming\Towawi\qyexx.exe"C:\Users\Admin\AppData\Roaming\Towawi\qyexx.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7534c5f2.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2724
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1036
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD557c879cbf7021e0b797444202f96d835
SHA160760764ca48fd3eeda64652dbc2028c43169b3f
SHA25682ec1f1284cc8dcde03baecf6c777dd5387806f088688019e0b195477b0c0c26
SHA512403a18fbb20d520ff15dd38a53ffec4018e98af83e3e205abd30fbf31037c6ca303460e9c386bc34d9413bbda11d9481e0eb070fc978d575ba400a053c8a1585
-
Filesize
305KB
MD5c84f621d353e17c52192c64f08fb6b80
SHA111601ee7515b4ba07a4dcce3e066176949deb1c9
SHA2567c265094d772793052bba60b607a669b6d5fdde6018b8dfff4381a8bb60f183a
SHA512820b18afaef97ebb96a5cd785f52db763dffe4a574f3d131cae81cf3bac3adf90e66e0a774629209cd2a8d645f054d96bf69266adfda420d5ed27dcc4584cfeb