Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe
-
Size
307KB
-
MD5
aedc5de633046a7432a0fd0bc7b14d50
-
SHA1
3be821b7a72d04d3fc648df371fe862540b2eeec
-
SHA256
d57a1302ac2bfdd78775e66ad08e43956279e5db1d33c5e6bdcec8ea59345535
-
SHA512
d854bcdee52a9466158c640825d03029f8ea86bf93a8ec49d17db1b5d3a4e77f32636a6c746c12a72aff93910b460293e8fe53e9de68229eb8e8f492cb3b59e1
-
SSDEEP
6144:2qzvT72Y0SpzinYKTY1SQshfRPVQe1MZkIYSccr7wbstOxPECYeixlYGicYxSI:2Cr7SSQYsY1UMqMZJYSN7wbstOx8fveH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1692 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2544 wywocu.exe -
Loads dropped DLL 1 IoCs
pid Process 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F5C6EAE8-1B61-AD4F-A81D-915899A2B245} = "C:\\Users\\Admin\\AppData\\Roaming\\Ojwo\\wywocu.exe" wywocu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1916 set thread context of 1692 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wywocu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Privacy aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe 2544 wywocu.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2544 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe 30 PID 1916 wrote to memory of 2544 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe 30 PID 1916 wrote to memory of 2544 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe 30 PID 1916 wrote to memory of 2544 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe 30 PID 2544 wrote to memory of 1076 2544 wywocu.exe 18 PID 2544 wrote to memory of 1076 2544 wywocu.exe 18 PID 2544 wrote to memory of 1076 2544 wywocu.exe 18 PID 2544 wrote to memory of 1076 2544 wywocu.exe 18 PID 2544 wrote to memory of 1076 2544 wywocu.exe 18 PID 2544 wrote to memory of 1168 2544 wywocu.exe 20 PID 2544 wrote to memory of 1168 2544 wywocu.exe 20 PID 2544 wrote to memory of 1168 2544 wywocu.exe 20 PID 2544 wrote to memory of 1168 2544 wywocu.exe 20 PID 2544 wrote to memory of 1168 2544 wywocu.exe 20 PID 2544 wrote to memory of 1208 2544 wywocu.exe 21 PID 2544 wrote to memory of 1208 2544 wywocu.exe 21 PID 2544 wrote to memory of 1208 2544 wywocu.exe 21 PID 2544 wrote to memory of 1208 2544 wywocu.exe 21 PID 2544 wrote to memory of 1208 2544 wywocu.exe 21 PID 2544 wrote to memory of 1800 2544 wywocu.exe 25 PID 2544 wrote to memory of 1800 2544 wywocu.exe 25 PID 2544 wrote to memory of 1800 2544 wywocu.exe 25 PID 2544 wrote to memory of 1800 2544 wywocu.exe 25 PID 2544 wrote to memory of 1800 2544 wywocu.exe 25 PID 2544 wrote to memory of 1916 2544 wywocu.exe 29 PID 2544 wrote to memory of 1916 2544 wywocu.exe 29 PID 2544 wrote to memory of 1916 2544 wywocu.exe 29 PID 2544 wrote to memory of 1916 2544 wywocu.exe 29 PID 2544 wrote to memory of 1916 2544 wywocu.exe 29 PID 1916 wrote to memory of 1692 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe 31 PID 1916 wrote to memory of 1692 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe 31 PID 1916 wrote to memory of 1692 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe 31 PID 1916 wrote to memory of 1692 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe 31 PID 1916 wrote to memory of 1692 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe 31 PID 1916 wrote to memory of 1692 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe 31 PID 1916 wrote to memory of 1692 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe 31 PID 1916 wrote to memory of 1692 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe 31 PID 1916 wrote to memory of 1692 1916 aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe 31 PID 2544 wrote to memory of 3020 2544 wywocu.exe 34 PID 2544 wrote to memory of 3020 2544 wywocu.exe 34 PID 2544 wrote to memory of 3020 2544 wywocu.exe 34 PID 2544 wrote to memory of 3020 2544 wywocu.exe 34 PID 2544 wrote to memory of 3020 2544 wywocu.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1076
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aedc5de633046a7432a0fd0bc7b14d50_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Roaming\Ojwo\wywocu.exe"C:\Users\Admin\AppData\Roaming\Ojwo\wywocu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9128c813.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1692
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1800
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD527e6d1d92def68aa6d641d5980123463
SHA174bfae7afd769852af46b83f94c319ea577e8132
SHA2563ee5b15db8d90b6ef93b963debdd816109a5bcffb5f514581054cc93930a208c
SHA512976965ee0856ea337200298b68db0aafb05c3fc64eb3ad925b077cbe4bf337a4ae7746fe90cdcecb094461e42bc4e9c8f55f7e3b470fb33c6320614623f99615
-
Filesize
307KB
MD529499ff7315de7d18019109a68036d58
SHA11d8220e676496d177e477c17dd1b4d0a6dddc5f2
SHA256db1890a7957a6d22aed59ea53cd961c0d9d1584861d92d22b5aeb2e6700ae254
SHA512777c2008d2db501bd348513c90f223352c391482fb1e5e5358d4a4d9391066dfd930b7d176aaf2b3b27d9baa37a6ce6d417e15310bba40f0ca8fded8a13fc11c