Analysis
-
max time kernel
144s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe
-
Size
18KB
-
MD5
94e7ccde16fbf344d5e6f4cf48931368
-
SHA1
fb8e7797bf2d6269b705cf67b25c0268561bad53
-
SHA256
5804cab890ac0b252201ff021beaa43b9acb674fd094fe9c410fc3a028bff4be
-
SHA512
ef62d41b3c924bf9e96e172eea8a8ab4df6d258eeb3b92b4bd5b7de5c8b3b870c1256b18f7167ef6c1f2a67f806972f4b46f1cd3d409a6028dc548611610efe1
-
SSDEEP
384:q1mc1a9fcjyqKOTWtZ5VlJVhD4EA44MGjivKEaNJawcudoD7U9h:qmtui5bvSEAlvtnbcuyD7U9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" coiome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 888 coiome.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\safe360 = "C:\\Program Files\\Common Files\\sfbsbvy\\coiome.exe" mshta.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe File created C:\Program Files (x86)\WTM.hta 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy coiome.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2392 sc.exe 1504 sc.exe 2268 sc.exe 5112 sc.exe 3224 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coiome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 3 IoCs
pid Process 4744 taskkill.exe 4184 taskkill.exe 744 taskkill.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.2345.com/?kkkbaidu" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\default_page_url = "http://www.2345.com/?kkkbaidu" mshta.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?kkkbaidu" mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4752 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe Token: SeDebugPrivilege 744 taskkill.exe Token: SeDebugPrivilege 888 coiome.exe Token: SeDebugPrivilege 4744 taskkill.exe Token: SeDebugPrivilege 4184 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4752 wrote to memory of 116 4752 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe 86 PID 4752 wrote to memory of 116 4752 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe 86 PID 4752 wrote to memory of 116 4752 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe 86 PID 4752 wrote to memory of 2772 4752 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe 88 PID 4752 wrote to memory of 2772 4752 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe 88 PID 4752 wrote to memory of 2772 4752 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe 88 PID 2772 wrote to memory of 744 2772 cmd.exe 90 PID 2772 wrote to memory of 744 2772 cmd.exe 90 PID 2772 wrote to memory of 744 2772 cmd.exe 90 PID 4752 wrote to memory of 888 4752 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe 97 PID 4752 wrote to memory of 888 4752 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe 97 PID 4752 wrote to memory of 888 4752 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe 97 PID 4752 wrote to memory of 5052 4752 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe 99 PID 4752 wrote to memory of 5052 4752 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe 99 PID 4752 wrote to memory of 5052 4752 94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe 99 PID 888 wrote to memory of 4220 888 coiome.exe 101 PID 888 wrote to memory of 4220 888 coiome.exe 101 PID 888 wrote to memory of 4220 888 coiome.exe 101 PID 888 wrote to memory of 2012 888 coiome.exe 102 PID 888 wrote to memory of 2012 888 coiome.exe 102 PID 888 wrote to memory of 2012 888 coiome.exe 102 PID 2012 wrote to memory of 4744 2012 cmd.exe 105 PID 2012 wrote to memory of 4744 2012 cmd.exe 105 PID 2012 wrote to memory of 4744 2012 cmd.exe 105 PID 4220 wrote to memory of 5112 4220 cmd.exe 106 PID 4220 wrote to memory of 5112 4220 cmd.exe 106 PID 4220 wrote to memory of 5112 4220 cmd.exe 106 PID 888 wrote to memory of 3344 888 coiome.exe 107 PID 888 wrote to memory of 3344 888 coiome.exe 107 PID 888 wrote to memory of 3344 888 coiome.exe 107 PID 3344 wrote to memory of 4184 3344 cmd.exe 109 PID 3344 wrote to memory of 4184 3344 cmd.exe 109 PID 3344 wrote to memory of 4184 3344 cmd.exe 109 PID 888 wrote to memory of 4324 888 coiome.exe 110 PID 888 wrote to memory of 4324 888 coiome.exe 110 PID 888 wrote to memory of 4324 888 coiome.exe 110 PID 4324 wrote to memory of 3224 4324 cmd.exe 112 PID 4324 wrote to memory of 3224 4324 cmd.exe 112 PID 4324 wrote to memory of 3224 4324 cmd.exe 112 PID 888 wrote to memory of 4984 888 coiome.exe 113 PID 888 wrote to memory of 4984 888 coiome.exe 113 PID 888 wrote to memory of 4984 888 coiome.exe 113 PID 888 wrote to memory of 5012 888 coiome.exe 115 PID 888 wrote to memory of 5012 888 coiome.exe 115 PID 888 wrote to memory of 5012 888 coiome.exe 115 PID 4984 wrote to memory of 4868 4984 cmd.exe 117 PID 4984 wrote to memory of 4868 4984 cmd.exe 117 PID 4984 wrote to memory of 4868 4984 cmd.exe 117 PID 5012 wrote to memory of 2392 5012 cmd.exe 118 PID 5012 wrote to memory of 2392 5012 cmd.exe 118 PID 5012 wrote to memory of 2392 5012 cmd.exe 118 PID 888 wrote to memory of 4780 888 coiome.exe 119 PID 888 wrote to memory of 4780 888 coiome.exe 119 PID 888 wrote to memory of 4780 888 coiome.exe 119 PID 4780 wrote to memory of 3604 4780 cmd.exe 121 PID 4780 wrote to memory of 3604 4780 cmd.exe 121 PID 4780 wrote to memory of 3604 4780 cmd.exe 121 PID 888 wrote to memory of 3420 888 coiome.exe 122 PID 888 wrote to memory of 3420 888 coiome.exe 122 PID 888 wrote to memory of 3420 888 coiome.exe 122 PID 888 wrote to memory of 4420 888 coiome.exe 124 PID 888 wrote to memory of 4420 888 coiome.exe 124 PID 888 wrote to memory of 4420 888 coiome.exe 124 PID 4420 wrote to memory of 1504 4420 cmd.exe 126 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3604 attrib.exe 4868 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Program Files (x86)\WTM.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:116
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im coiome.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im coiome.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
-
C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe"C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\cmd.execmd /c sc delete JavaServe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\sc.exesc delete JavaServe4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im iejore.exe /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im iejore.exe /f4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im conime.exe /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im conime.exe /f4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4184
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc stop LYTC3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\sc.exesc stop LYTC4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3224
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Cookies\*.*"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4868
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete LYTC3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\sc.exesc delete LYTC4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Local Settings\Temp\Cookies\*.*"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3604
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Cookies\*.*3⤵
- System Location Discovery: System Language Discovery
PID:3420
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc stop HidServ3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\sc.exesc stop HidServ4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temporary Internet Files\*.*"3⤵
- System Location Discovery: System Language Discovery
PID:1076
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete HidServ3⤵
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\SysWOW64\sc.exesc delete HidServ4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Documents and Settings\All Users\Application Data\Storm\update\%SESSIONNAME%\*.* /e /p everyone:n3⤵
- System Location Discovery: System Language Discovery
PID:3404 -
C:\Windows\SysWOW64\cacls.execacls C:\Documents and Settings\All Users\Application Data\Storm\update\Console\*.* /e /p everyone:n4⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\94e7ccde16fbf344d5e6f4cf48931368_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5052
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Indicator Removal
1File Deletion
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD54267ae4488d101c265c0d94038665a6f
SHA18e4639c878c592e0e77382d307ca75a020749575
SHA2560cf7769ebdab38120d646778fe7147b7462c9860b6e7f7b7805484c54ac5bc28
SHA5127b9d0c8593e622826f906b32bc789c682ff6334acb6557c8ce66ec793c92013485a574136d2b0f0c96cb8f946279cb6dcf64809cbfe1b4eed6953681dbe6f11d
-
Filesize
785B
MD574ccbce1e5800180a01fb299767e310c
SHA15eee44303a3800e0ac31a103538dccfe4ffa57b2
SHA2567c800551aa79c34f689c2d87e3b24c2bfaca0d2815538650abe445c3cb3a77ec
SHA512581385678a72de017f99b41d565d5acd8b2ffa322e20ae9489803b6043fe6696ccab38c43ae5583afda73cb3f33b4fa33813c543ffb4e34b17394d1ec6fae6c8