Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe
-
Size
270KB
-
MD5
aebb4b0201ea3f620adf73a0cfe49709
-
SHA1
e59fcf1a12abf3df45332062356f2f289789916c
-
SHA256
a34bf9c769b6fbdcce3b6a95f30ed7b98dbaf821d4e1ee69b29daf8cc406b7ec
-
SHA512
758b677082f6c2d4d1dda19b8400466a7665c580d51933c980e1e376df488ab44f69db3a2560e715242a7c9d39af6db85555b3f443dd9c2e5472d66c116c2b91
-
SSDEEP
6144:wtjpw5qvoArlO+Bei02/pWTxq/fnx7GDrRcJIcxyCq0hzfQ:A5vo8qVq/PERcHxywQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2640 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2304 yqegze.exe -
Loads dropped DLL 2 IoCs
pid Process 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\{15320D28-6FEE-AD4F-3AAA-40C7281D63DA} = "C:\\Users\\Admin\\AppData\\Roaming\\Anoxuf\\yqegze.exe" yqegze.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 696 set thread context of 2640 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Privacy aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe 2304 yqegze.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 2304 yqegze.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 696 wrote to memory of 2304 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 31 PID 696 wrote to memory of 2304 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 31 PID 696 wrote to memory of 2304 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 31 PID 696 wrote to memory of 2304 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 31 PID 2304 wrote to memory of 1112 2304 yqegze.exe 19 PID 2304 wrote to memory of 1112 2304 yqegze.exe 19 PID 2304 wrote to memory of 1112 2304 yqegze.exe 19 PID 2304 wrote to memory of 1112 2304 yqegze.exe 19 PID 2304 wrote to memory of 1112 2304 yqegze.exe 19 PID 2304 wrote to memory of 1160 2304 yqegze.exe 20 PID 2304 wrote to memory of 1160 2304 yqegze.exe 20 PID 2304 wrote to memory of 1160 2304 yqegze.exe 20 PID 2304 wrote to memory of 1160 2304 yqegze.exe 20 PID 2304 wrote to memory of 1160 2304 yqegze.exe 20 PID 2304 wrote to memory of 1200 2304 yqegze.exe 21 PID 2304 wrote to memory of 1200 2304 yqegze.exe 21 PID 2304 wrote to memory of 1200 2304 yqegze.exe 21 PID 2304 wrote to memory of 1200 2304 yqegze.exe 21 PID 2304 wrote to memory of 1200 2304 yqegze.exe 21 PID 2304 wrote to memory of 2044 2304 yqegze.exe 23 PID 2304 wrote to memory of 2044 2304 yqegze.exe 23 PID 2304 wrote to memory of 2044 2304 yqegze.exe 23 PID 2304 wrote to memory of 2044 2304 yqegze.exe 23 PID 2304 wrote to memory of 2044 2304 yqegze.exe 23 PID 2304 wrote to memory of 696 2304 yqegze.exe 30 PID 2304 wrote to memory of 696 2304 yqegze.exe 30 PID 2304 wrote to memory of 696 2304 yqegze.exe 30 PID 2304 wrote to memory of 696 2304 yqegze.exe 30 PID 2304 wrote to memory of 696 2304 yqegze.exe 30 PID 696 wrote to memory of 2640 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 32 PID 696 wrote to memory of 2640 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 32 PID 696 wrote to memory of 2640 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 32 PID 696 wrote to memory of 2640 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 32 PID 696 wrote to memory of 2640 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 32 PID 696 wrote to memory of 2640 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 32 PID 696 wrote to memory of 2640 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 32 PID 696 wrote to memory of 2640 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 32 PID 696 wrote to memory of 2640 696 aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aebb4b0201ea3f620adf73a0cfe49709_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Roaming\Anoxuf\yqegze.exe"C:\Users\Admin\AppData\Roaming\Anoxuf\yqegze.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2304
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp02ba3e87.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5bb6a6a42e2271312e899e7245bbc9963
SHA1240987b27beccfa0db57154132486c0d8e12d8f5
SHA256ad231fdc48b33fc8aef5123b9888b46126d6aec47d542756dd38e00f00f3c648
SHA512f7cccec03baa719f774205dc6f541d479b1ea2cef1a345edfe157ec149f5070a292d9919df543a4798a3dc369f556e78695fe2d2290d60275c1c5db8f4cb3245
-
Filesize
270KB
MD586126e390da38831036368a4aeaa320b
SHA1fd3bbbbb1bd0d65b235bc451f7dea88d65f5c89b
SHA25650e41445b9f5be0fc8e6792ac42a7725311450c6271f4b661fe369d83005f44c
SHA5122da7e659297a97790fb6aa41774848c06bae4102e734712e7ce5217b30f8784f0ff3ee2a2cb353f7e94a60d486cd9faade33d0fc0da874aee6c9f09fa902d3ea