Analysis
-
max time kernel
150s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 14:05
Behavioral task
behavioral1
Sample
ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe
-
Size
183KB
-
MD5
ab51e7d1206768ac7cb080b7669e4507
-
SHA1
8edfa669ef309a4b329cc109d6a90a3ab6635e71
-
SHA256
a1af1187d0d90dc13f73aa9f01e23bef0a9fe29804c5c19537ce43d7ed2c649b
-
SHA512
a5f8d03848925790c21ab27f28a7d47429cd188c807d7702a47067dcf983adabee7297dc7c3e8e143c5b4a72044db7888b5589f7811bd40d0c81cc9be11a71db
-
SSDEEP
3072:/9IxCZkIMJ45FlxmN71ySIrDG1zPw3jjhHoH5RPiQN/tUMuxsezGJI62ddQ7:RX5FlxY1yS6ypwBHoH5xLuQ2ddQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1932 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2792 xeamu.exe -
Loads dropped DLL 2 IoCs
pid Process 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1316-0-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/files/0x0008000000016d3f-6.dat upx behavioral1/memory/1316-8-0x0000000000370000-0x00000000003B4000-memory.dmp upx behavioral1/memory/1316-13-0x0000000000370000-0x00000000003B4000-memory.dmp upx behavioral1/memory/2792-15-0x0000000000400000-0x0000000000444000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C2421E3F-A70B-8452-0FF7-7A5368232AB4} = "C:\\Users\\Admin\\AppData\\Roaming\\Zaylgo\\xeamu.exe" xeamu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1316 set thread context of 1932 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeamu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Privacy ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe 2792 xeamu.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe Token: SeSecurityPrivilege 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe Token: SeSecurityPrivilege 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2792 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 30 PID 1316 wrote to memory of 2792 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 30 PID 1316 wrote to memory of 2792 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 30 PID 1316 wrote to memory of 2792 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 30 PID 2792 wrote to memory of 1116 2792 xeamu.exe 19 PID 2792 wrote to memory of 1116 2792 xeamu.exe 19 PID 2792 wrote to memory of 1116 2792 xeamu.exe 19 PID 2792 wrote to memory of 1116 2792 xeamu.exe 19 PID 2792 wrote to memory of 1116 2792 xeamu.exe 19 PID 2792 wrote to memory of 1164 2792 xeamu.exe 20 PID 2792 wrote to memory of 1164 2792 xeamu.exe 20 PID 2792 wrote to memory of 1164 2792 xeamu.exe 20 PID 2792 wrote to memory of 1164 2792 xeamu.exe 20 PID 2792 wrote to memory of 1164 2792 xeamu.exe 20 PID 2792 wrote to memory of 1200 2792 xeamu.exe 21 PID 2792 wrote to memory of 1200 2792 xeamu.exe 21 PID 2792 wrote to memory of 1200 2792 xeamu.exe 21 PID 2792 wrote to memory of 1200 2792 xeamu.exe 21 PID 2792 wrote to memory of 1200 2792 xeamu.exe 21 PID 2792 wrote to memory of 748 2792 xeamu.exe 23 PID 2792 wrote to memory of 748 2792 xeamu.exe 23 PID 2792 wrote to memory of 748 2792 xeamu.exe 23 PID 2792 wrote to memory of 748 2792 xeamu.exe 23 PID 2792 wrote to memory of 748 2792 xeamu.exe 23 PID 2792 wrote to memory of 1316 2792 xeamu.exe 29 PID 2792 wrote to memory of 1316 2792 xeamu.exe 29 PID 2792 wrote to memory of 1316 2792 xeamu.exe 29 PID 2792 wrote to memory of 1316 2792 xeamu.exe 29 PID 2792 wrote to memory of 1316 2792 xeamu.exe 29 PID 1316 wrote to memory of 1932 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 31 PID 1316 wrote to memory of 1932 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 31 PID 1316 wrote to memory of 1932 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 31 PID 1316 wrote to memory of 1932 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 31 PID 1316 wrote to memory of 1932 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 31 PID 1316 wrote to memory of 1932 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 31 PID 1316 wrote to memory of 1932 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 31 PID 1316 wrote to memory of 1932 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 31 PID 1316 wrote to memory of 1932 1316 ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe 31 PID 2792 wrote to memory of 1272 2792 xeamu.exe 33 PID 2792 wrote to memory of 1272 2792 xeamu.exe 33 PID 2792 wrote to memory of 1272 2792 xeamu.exe 33 PID 2792 wrote to memory of 1272 2792 xeamu.exe 33 PID 2792 wrote to memory of 1272 2792 xeamu.exe 33 PID 2792 wrote to memory of 2492 2792 xeamu.exe 34 PID 2792 wrote to memory of 2492 2792 xeamu.exe 34 PID 2792 wrote to memory of 2492 2792 xeamu.exe 34 PID 2792 wrote to memory of 2492 2792 xeamu.exe 34 PID 2792 wrote to memory of 2492 2792 xeamu.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ab51e7d1206768ac7cb080b7669e4507_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Roaming\Zaylgo\xeamu.exe"C:\Users\Admin\AppData\Roaming\Zaylgo\xeamu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2792
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpcd00467b.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1932
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:748
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1272
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD56ca5c66ff44d26d4abfbc2f3360cb32f
SHA159bfd5060b92c6923a7b0e83b5fdb10114bf16e4
SHA2562a7dfa30328e6d5665ae36a382c0d92fbe16533106d7e312e461383a72ecc4fc
SHA51263ce52e4a8e743949376cf5f0a2657c0333bddb75575d086c7fbb1337f5f95d84d718482dbb8d5cc1eaf4ddf29db0456db60a85d587be696fb1e2585290d1a0e
-
Filesize
380B
MD52af70ccd37a6e00c0d4b58bc6f2fad76
SHA157caced7144e0c66e6d9061ed0b2964e4de8de18
SHA2562153f28c96b6d6ed084c23bb7214d8527987a071fe9d62ade03306fec4799ab7
SHA5120b932bb2095a4c22a6a451d898e62ed8d03fe6c3c83e10d5c0f297657ff6a1e6c108f092d841efdeca576311b9c4b3f417ac9a8c2f97f22b2c1bb1e653747845
-
Filesize
183KB
MD5ed1642cb6832f89437c88e6b1a569d24
SHA1befe32939535c8b9be9092aa319ef376647ab4f0
SHA256eb2201287d5fcf4569f16343a79fdcd1948f4a341b358860043a4d305925d8ee
SHA512480974113992f6f388c30a3e55e86307ed547f84f95cae93d8720073869808de3f91e0f35fdd69e84ad1f1cbc4aff275d7cf6cd8bc61d8cb4addb0a52de5ae15