Analysis
-
max time kernel
150s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe
-
Size
138KB
-
MD5
a00fe918ff084c9fc79df34f5b608324
-
SHA1
15b341c9ba3b60bd89cb9d0429e50cbe95e9c509
-
SHA256
badbc96d2550b110179ebc4800c3cdf6c7cc2507c29bcc5d659ecba21307888e
-
SHA512
f681cfa838b99272b1d47879f39fe1b7654f50a4c048e5dc2b5b734320ad2679f4077f9531351176ca4898b416fce5bbbb99beeedaa0f5e4b6d016159de1ef75
-
SSDEEP
3072:/caqyte6YV77snHLLxtAyaXOqdPNbnhW4IxZx5kCZuubFrhU1wKKrONmw:/caBtW77snHRTY7PNNW4IxZ7zbC0rONh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1012 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2384 byaci.exe -
Loads dropped DLL 2 IoCs
pid Process 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\{10C6B2ED-3F77-494B-5DF3-D5793CDA6113} = "C:\\Users\\Admin\\AppData\\Roaming\\Lequ\\byaci.exe" byaci.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2116 set thread context of 1012 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byaci.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Privacy a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\68E8019B-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe 2384 byaci.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe Token: SeSecurityPrivilege 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe Token: SeSecurityPrivilege 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe Token: SeManageVolumePrivilege 2496 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2496 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2496 WinMail.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2384 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2384 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2384 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2384 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 29 PID 2384 wrote to memory of 1096 2384 byaci.exe 18 PID 2384 wrote to memory of 1096 2384 byaci.exe 18 PID 2384 wrote to memory of 1096 2384 byaci.exe 18 PID 2384 wrote to memory of 1096 2384 byaci.exe 18 PID 2384 wrote to memory of 1096 2384 byaci.exe 18 PID 2384 wrote to memory of 1152 2384 byaci.exe 19 PID 2384 wrote to memory of 1152 2384 byaci.exe 19 PID 2384 wrote to memory of 1152 2384 byaci.exe 19 PID 2384 wrote to memory of 1152 2384 byaci.exe 19 PID 2384 wrote to memory of 1152 2384 byaci.exe 19 PID 2384 wrote to memory of 1196 2384 byaci.exe 20 PID 2384 wrote to memory of 1196 2384 byaci.exe 20 PID 2384 wrote to memory of 1196 2384 byaci.exe 20 PID 2384 wrote to memory of 1196 2384 byaci.exe 20 PID 2384 wrote to memory of 1196 2384 byaci.exe 20 PID 2384 wrote to memory of 1240 2384 byaci.exe 22 PID 2384 wrote to memory of 1240 2384 byaci.exe 22 PID 2384 wrote to memory of 1240 2384 byaci.exe 22 PID 2384 wrote to memory of 1240 2384 byaci.exe 22 PID 2384 wrote to memory of 1240 2384 byaci.exe 22 PID 2384 wrote to memory of 2116 2384 byaci.exe 28 PID 2384 wrote to memory of 2116 2384 byaci.exe 28 PID 2384 wrote to memory of 2116 2384 byaci.exe 28 PID 2384 wrote to memory of 2116 2384 byaci.exe 28 PID 2384 wrote to memory of 2116 2384 byaci.exe 28 PID 2384 wrote to memory of 2496 2384 byaci.exe 30 PID 2384 wrote to memory of 2496 2384 byaci.exe 30 PID 2384 wrote to memory of 2496 2384 byaci.exe 30 PID 2384 wrote to memory of 2496 2384 byaci.exe 30 PID 2384 wrote to memory of 2496 2384 byaci.exe 30 PID 2116 wrote to memory of 1012 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 31 PID 2116 wrote to memory of 1012 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 31 PID 2116 wrote to memory of 1012 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 31 PID 2116 wrote to memory of 1012 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 31 PID 2116 wrote to memory of 1012 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 31 PID 2116 wrote to memory of 1012 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 31 PID 2116 wrote to memory of 1012 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 31 PID 2116 wrote to memory of 1012 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 31 PID 2116 wrote to memory of 1012 2116 a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe 31 PID 2384 wrote to memory of 2792 2384 byaci.exe 33 PID 2384 wrote to memory of 2792 2384 byaci.exe 33 PID 2384 wrote to memory of 2792 2384 byaci.exe 33 PID 2384 wrote to memory of 2792 2384 byaci.exe 33 PID 2384 wrote to memory of 2792 2384 byaci.exe 33 PID 2384 wrote to memory of 2396 2384 byaci.exe 34 PID 2384 wrote to memory of 2396 2384 byaci.exe 34 PID 2384 wrote to memory of 2396 2384 byaci.exe 34 PID 2384 wrote to memory of 2396 2384 byaci.exe 34 PID 2384 wrote to memory of 2396 2384 byaci.exe 34 PID 2384 wrote to memory of 2100 2384 byaci.exe 36 PID 2384 wrote to memory of 2100 2384 byaci.exe 36 PID 2384 wrote to memory of 2100 2384 byaci.exe 36 PID 2384 wrote to memory of 2100 2384 byaci.exe 36 PID 2384 wrote to memory of 2100 2384 byaci.exe 36 PID 2384 wrote to memory of 1124 2384 byaci.exe 37 PID 2384 wrote to memory of 1124 2384 byaci.exe 37 PID 2384 wrote to memory of 1124 2384 byaci.exe 37 PID 2384 wrote to memory of 1124 2384 byaci.exe 37 PID 2384 wrote to memory of 1124 2384 byaci.exe 37
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1096
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1152
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a00fe918ff084c9fc79df34f5b608324_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Roaming\Lequ\byaci.exe"C:\Users\Admin\AppData\Roaming\Lequ\byaci.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp10486b82.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1012
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1240
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2496
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2792
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2396
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2100
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5dcbbe3f490764ff5818ad5f9110acb89
SHA132235ae0d8842d7e9293d3edd3c29e9413cd0161
SHA2565a544007d5361d158202b5fd0b4a68d3d5eddb99eb33909c4843f302f7fcc06e
SHA5123304ce4231098db8820dd13061596325f903b523de56d60c2b0df246541714572558a974c61d86e07bd3312f4b3b352e4abef97488f1b5351600e78dd0084c31
-
Filesize
271B
MD57e2cfebb1131d8e58b4972ee89c8f897
SHA1fd24b0d51ea40b7edd6f8566ec4acdd28a600f30
SHA256ffc36bfab2293a8c016f262e0888c09857a22c0c89fd80aea8be3e57a1e13083
SHA512003909b9d92c44a9bbbbe5f83d637edb20febd2e50573515e39d0375ef29b275ed6dd8e162012ef5e40fe17b1e822e746b77fd6854c6076f334231831873344d
-
Filesize
380B
MD5b43594d3d61d4be7cb3147b0404e4197
SHA1cc84a4b8f35813adab2e746814108dce25fb66cc
SHA256c8fc8591995fd7b231b3177eb6e2b47e52739053a1e6eb2e844cea1f64636cea
SHA5128acf3626f3b797b249ffc57776f3832657fa5909923f8adfc5b34f61952c84c726c316a30a76ea3b498d769d00f97f1b0de9feb24184db975bb6f658ec624694
-
Filesize
138KB
MD5c9cf9c9dd4dc316ad63f43270f07adff
SHA110de3c4af18df4e17294872b0b759c5f0bc60c77
SHA256f8c376afdfb5760b382172d7cf6080845056ac7db4a03b545200d2dac3918068
SHA512ab12e887f5d559b5d53a3f62f568f4caaab24c85be37c4be75e73ae1c7a5797771e57819c9eee452ac73ce52366e2788f2825a470822b1e8768d350d43adc044