Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe
-
Size
357KB
-
MD5
a3baa4a1231ae7f0ffddcb977a4473a6
-
SHA1
21c72722e1a5983fa70fb11a19c11fb767dc0149
-
SHA256
cd1368db50c1b1e553ed4f200c06ed9cf342ad140b414e7e3dfa306d2a6335fe
-
SHA512
80f5e3e804a319a40a16c36596b689230744bbb5b1fa2cc6751f7357ede635394bddfe40f7cc55e3b5d160d085af48131ff30b501a27f715294b679de9f7c5c2
-
SSDEEP
6144:M4//bqpBm1Hs3czyOxW8RjSqjAvzxCaQHkRE0ZjOEd4xEtpzbpY:M4rqpB6Hs3czfxW8B7jAv1CaXGIGGbC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2956 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2812 emuzy.exe -
Loads dropped DLL 2 IoCs
pid Process 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C4A05C48-6809-AD4F-9B76-1BFCA18838E1} = "C:\\Users\\Admin\\AppData\\Roaming\\Jafyec\\emuzy.exe" emuzy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2228 set thread context of 2956 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emuzy.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe 2812 emuzy.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 2812 emuzy.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2812 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2812 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2812 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2812 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 30 PID 2812 wrote to memory of 1104 2812 emuzy.exe 19 PID 2812 wrote to memory of 1104 2812 emuzy.exe 19 PID 2812 wrote to memory of 1104 2812 emuzy.exe 19 PID 2812 wrote to memory of 1104 2812 emuzy.exe 19 PID 2812 wrote to memory of 1104 2812 emuzy.exe 19 PID 2812 wrote to memory of 1152 2812 emuzy.exe 20 PID 2812 wrote to memory of 1152 2812 emuzy.exe 20 PID 2812 wrote to memory of 1152 2812 emuzy.exe 20 PID 2812 wrote to memory of 1152 2812 emuzy.exe 20 PID 2812 wrote to memory of 1152 2812 emuzy.exe 20 PID 2812 wrote to memory of 1200 2812 emuzy.exe 21 PID 2812 wrote to memory of 1200 2812 emuzy.exe 21 PID 2812 wrote to memory of 1200 2812 emuzy.exe 21 PID 2812 wrote to memory of 1200 2812 emuzy.exe 21 PID 2812 wrote to memory of 1200 2812 emuzy.exe 21 PID 2812 wrote to memory of 1248 2812 emuzy.exe 25 PID 2812 wrote to memory of 1248 2812 emuzy.exe 25 PID 2812 wrote to memory of 1248 2812 emuzy.exe 25 PID 2812 wrote to memory of 1248 2812 emuzy.exe 25 PID 2812 wrote to memory of 1248 2812 emuzy.exe 25 PID 2812 wrote to memory of 2228 2812 emuzy.exe 29 PID 2812 wrote to memory of 2228 2812 emuzy.exe 29 PID 2812 wrote to memory of 2228 2812 emuzy.exe 29 PID 2812 wrote to memory of 2228 2812 emuzy.exe 29 PID 2812 wrote to memory of 2228 2812 emuzy.exe 29 PID 2228 wrote to memory of 2956 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2956 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2956 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2956 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2956 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2956 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2956 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2956 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2956 2228 a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe 31 PID 2812 wrote to memory of 2412 2812 emuzy.exe 34 PID 2812 wrote to memory of 2412 2812 emuzy.exe 34 PID 2812 wrote to memory of 2412 2812 emuzy.exe 34 PID 2812 wrote to memory of 2412 2812 emuzy.exe 34 PID 2812 wrote to memory of 2412 2812 emuzy.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1152
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3baa4a1231ae7f0ffddcb977a4473a6_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Roaming\Jafyec\emuzy.exe"C:\Users\Admin\AppData\Roaming\Jafyec\emuzy.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp15c47268.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2956
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1248
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5992fd82b0877e85c22efa137654dd8ca
SHA168933aa5bba3aef20c8a139da7f829e330640dcd
SHA25625de83f2537fea1654538ac664108146060d600bdb2620c396e18b66b0e9cfcb
SHA512555763ce7e76c57d7a14c54356ec04fbfb053100236d35a14721fc119e7d8f2c4c94764888308a6305a01a1e412333a4b2654d6de742054a5a4fc1813d524cd5
-
Filesize
357KB
MD5b0e9196ae92294b4dc723c41b0b59b53
SHA1a82c8c3a08ca27b35b651c79dece1465eaacbdc8
SHA25675d8e65582481af1c2bbf889081cd0461f9389a8de072418e90e5a6f7e417da6
SHA5125206dd1f53d4a074daaf96f860465a47a6c919015bbc1a8d5e4f0086849dc5fba84f4a1c52e3f97e48173d7b344b85b977d88551ade05d9d9aa8a8fd5b7fd173