Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe
-
Size
295KB
-
MD5
aa368e40fa1a3d7fa3d3aa89db1aaec4
-
SHA1
3a44fad1e540ceb4582da42e7da625e5dda7049a
-
SHA256
d9fa867a9baeca417f4e12809d1f9a1b7b4726cd6fc4b5273846155c36b45032
-
SHA512
4ff888e5019391d29f6a5f3d5bf9e3d4dade3069a840c10039d51363a13999693f108c4c87b233dbed2071a15986a9fd004eb6616db0f4a454753b8b6efcbbdb
-
SSDEEP
6144:F6OySx7crxMb/Q7K86gD+bW55zbMLdOMLmlDMMSXm:FrySWrxF28/75Zb2cMLmlDMFm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2424 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2308 diduka.exe -
Loads dropped DLL 1 IoCs
pid Process 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\{75DA6328-6F30-AD4F-96DD-2BAD86C808B0} = "C:\\Users\\Admin\\AppData\\Roaming\\Uqak\\diduka.exe" diduka.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2324 set thread context of 2424 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diduka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe 2308 diduka.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2308 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe 30 PID 2324 wrote to memory of 2308 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe 30 PID 2324 wrote to memory of 2308 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe 30 PID 2324 wrote to memory of 2308 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe 30 PID 2308 wrote to memory of 1096 2308 diduka.exe 19 PID 2308 wrote to memory of 1096 2308 diduka.exe 19 PID 2308 wrote to memory of 1096 2308 diduka.exe 19 PID 2308 wrote to memory of 1096 2308 diduka.exe 19 PID 2308 wrote to memory of 1096 2308 diduka.exe 19 PID 2308 wrote to memory of 1168 2308 diduka.exe 20 PID 2308 wrote to memory of 1168 2308 diduka.exe 20 PID 2308 wrote to memory of 1168 2308 diduka.exe 20 PID 2308 wrote to memory of 1168 2308 diduka.exe 20 PID 2308 wrote to memory of 1168 2308 diduka.exe 20 PID 2308 wrote to memory of 1200 2308 diduka.exe 21 PID 2308 wrote to memory of 1200 2308 diduka.exe 21 PID 2308 wrote to memory of 1200 2308 diduka.exe 21 PID 2308 wrote to memory of 1200 2308 diduka.exe 21 PID 2308 wrote to memory of 1200 2308 diduka.exe 21 PID 2308 wrote to memory of 1644 2308 diduka.exe 24 PID 2308 wrote to memory of 1644 2308 diduka.exe 24 PID 2308 wrote to memory of 1644 2308 diduka.exe 24 PID 2308 wrote to memory of 1644 2308 diduka.exe 24 PID 2308 wrote to memory of 1644 2308 diduka.exe 24 PID 2308 wrote to memory of 2324 2308 diduka.exe 29 PID 2308 wrote to memory of 2324 2308 diduka.exe 29 PID 2308 wrote to memory of 2324 2308 diduka.exe 29 PID 2308 wrote to memory of 2324 2308 diduka.exe 29 PID 2308 wrote to memory of 2324 2308 diduka.exe 29 PID 2324 wrote to memory of 2424 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2424 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2424 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2424 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2424 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2424 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2424 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2424 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2424 2324 aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1096
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aa368e40fa1a3d7fa3d3aa89db1aaec4_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Roaming\Uqak\diduka.exe"C:\Users\Admin\AppData\Roaming\Uqak\diduka.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2308
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9f292bc0.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2424
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5c08515aebeb9c90dc35fbf5e16652ec0
SHA156ad325069fdb1115ffc3d10a6687c2dfaf687c7
SHA2562b7dd60ea0b216b6c972b1e3afd526953b617b2a91dba045251e016374d7b2a5
SHA512628b19b5b5284e4f221ea747f2f811245041f3622c22e1e4f14c2c7952a5318f3a8759861c60a9c17f5b9c61057270f33876fc1429ce1f8b7cf90bdf9dbc9bae
-
Filesize
295KB
MD571c0b0318f25486e117a71597caff91a
SHA13ca70f6fefd216959264c2603b4bdea382aa6982
SHA256a46575f69178345b6e4bbd94f0af1f6f1cfbeaa4f99fcaabd6322174b77d0175
SHA512564e32d218ac44be43b4ab5fe01e1ce79bff795f8d7994adbba8841f725b2c20522d9011ea3a72201390ac8fb45e4aa9d384e3b959adb9a05c932769686b682c