Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe
-
Size
333KB
-
MD5
a71745e77adbb1a39516e7f401613a64
-
SHA1
51a09e77443688c33ea179c56eb8e7c443b12941
-
SHA256
3bd8a12537c6c7eca1df5311be5fb6ed8f4cbe5fcc45e4eba701b241de7c546e
-
SHA512
ac2df46aeaf8f077e558f29be4af27359f3c7e5cda0a3d6390b5492884fcea80e7bdd0774d29f0da02f165083e203b7d0f57cd0453fc8ced0e3cbcd4508b6884
-
SSDEEP
6144:l80UKaRzEfyG+16F1xx+rHMYbvcOdNS0KCGOgmLArll67y0vAbGRB1zed:l80UKaRIM16Dxxsxvck6Ogm6ll62oRj6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2728 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2152 xokaca.exe -
Loads dropped DLL 1 IoCs
pid Process 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\{1B0C4E28-6E66-AD4F-AB1D-A71BBF328406} = "C:\\Users\\Admin\\AppData\\Roaming\\Kaid\\xokaca.exe" xokaca.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2164 set thread context of 2728 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xokaca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Privacy a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe 2152 xokaca.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 2152 xokaca.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2152 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 31 PID 2164 wrote to memory of 2152 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 31 PID 2164 wrote to memory of 2152 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 31 PID 2164 wrote to memory of 2152 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 31 PID 2152 wrote to memory of 1120 2152 xokaca.exe 19 PID 2152 wrote to memory of 1120 2152 xokaca.exe 19 PID 2152 wrote to memory of 1120 2152 xokaca.exe 19 PID 2152 wrote to memory of 1120 2152 xokaca.exe 19 PID 2152 wrote to memory of 1120 2152 xokaca.exe 19 PID 2152 wrote to memory of 1204 2152 xokaca.exe 20 PID 2152 wrote to memory of 1204 2152 xokaca.exe 20 PID 2152 wrote to memory of 1204 2152 xokaca.exe 20 PID 2152 wrote to memory of 1204 2152 xokaca.exe 20 PID 2152 wrote to memory of 1204 2152 xokaca.exe 20 PID 2152 wrote to memory of 1256 2152 xokaca.exe 21 PID 2152 wrote to memory of 1256 2152 xokaca.exe 21 PID 2152 wrote to memory of 1256 2152 xokaca.exe 21 PID 2152 wrote to memory of 1256 2152 xokaca.exe 21 PID 2152 wrote to memory of 1256 2152 xokaca.exe 21 PID 2152 wrote to memory of 1372 2152 xokaca.exe 23 PID 2152 wrote to memory of 1372 2152 xokaca.exe 23 PID 2152 wrote to memory of 1372 2152 xokaca.exe 23 PID 2152 wrote to memory of 1372 2152 xokaca.exe 23 PID 2152 wrote to memory of 1372 2152 xokaca.exe 23 PID 2152 wrote to memory of 2164 2152 xokaca.exe 30 PID 2152 wrote to memory of 2164 2152 xokaca.exe 30 PID 2152 wrote to memory of 2164 2152 xokaca.exe 30 PID 2152 wrote to memory of 2164 2152 xokaca.exe 30 PID 2152 wrote to memory of 2164 2152 xokaca.exe 30 PID 2164 wrote to memory of 2728 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2728 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2728 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2728 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2728 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2728 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2728 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2728 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2728 2164 a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1204
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Roaming\Kaid\xokaca.exe"C:\Users\Admin\AppData\Roaming\Kaid\xokaca.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2152
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp67921ab8.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5122ceeb7ac1c7f5fdf7dbcd4344347bf
SHA1905af4e5706a16bca1326516731f33609311170b
SHA256c47024eb108c16e93a800a0a5a7ebf6b4c8894a2c2250e26ba369f25fe38180d
SHA512ba0b8a27b394a2a7a542c5e38e6d2f561402c40ab94998d34df88cfa0e51252514d5fbb58d7d249f54641429f313dcf6f3c157017d8fa4a1e05b84d794e63b1a
-
Filesize
333KB
MD55b35d4b38c2d6d02eeb0e46ba546fa63
SHA1f26d5f924f9da7722f6b40f5c08470344c172969
SHA2562918298a15447f9d7dfe47a4527526570c294a00faf6e4f509050760da91eb47
SHA512ec7587292f0bf9b52e78b66a632f16b10d1ea418190a38dc59f1cef5f8a4992b325221538cda1c94f2bc969a5885fcc3a76acb366c4c571ba6dbff7663efd756