Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 07:03
Static task
static1
Behavioral task
behavioral1
Sample
b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe
-
Size
361KB
-
MD5
b28618a3385f05412e6cf6c12cbaedca
-
SHA1
98b8a335351a88477690bec56f5305c1253bedc0
-
SHA256
e87c93d5be65ae5657d3ec5ae88d6db96579e1e731d01a02b520ebab366608be
-
SHA512
7d2540d84f49d77f402c25bdd64ee8f11aec0ca497a88c9983ed531ed90a9e56d7d96774b81209346475497a9b6d68ce5a87403f659b74344b4154ea3ea91e99
-
SSDEEP
6144:986rJmm5lnW2PRTTC0VRNhPzWsnxiP8Audn:9pP5IWBhVPSsno8r9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1964 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 qofi.exe -
Loads dropped DLL 2 IoCs
pid Process 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C4A05C48-6809-AD4F-9B76-1BFCA18838E1} = "C:\\Users\\Admin\\AppData\\Roaming\\Vuvoq\\qofi.exe" qofi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1288 set thread context of 1964 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qofi.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe 2000 qofi.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 2000 qofi.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2000 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 30 PID 1288 wrote to memory of 2000 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 30 PID 1288 wrote to memory of 2000 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 30 PID 1288 wrote to memory of 2000 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 30 PID 2000 wrote to memory of 1104 2000 qofi.exe 19 PID 2000 wrote to memory of 1104 2000 qofi.exe 19 PID 2000 wrote to memory of 1104 2000 qofi.exe 19 PID 2000 wrote to memory of 1104 2000 qofi.exe 19 PID 2000 wrote to memory of 1104 2000 qofi.exe 19 PID 2000 wrote to memory of 1172 2000 qofi.exe 20 PID 2000 wrote to memory of 1172 2000 qofi.exe 20 PID 2000 wrote to memory of 1172 2000 qofi.exe 20 PID 2000 wrote to memory of 1172 2000 qofi.exe 20 PID 2000 wrote to memory of 1172 2000 qofi.exe 20 PID 2000 wrote to memory of 1196 2000 qofi.exe 21 PID 2000 wrote to memory of 1196 2000 qofi.exe 21 PID 2000 wrote to memory of 1196 2000 qofi.exe 21 PID 2000 wrote to memory of 1196 2000 qofi.exe 21 PID 2000 wrote to memory of 1196 2000 qofi.exe 21 PID 2000 wrote to memory of 2028 2000 qofi.exe 23 PID 2000 wrote to memory of 2028 2000 qofi.exe 23 PID 2000 wrote to memory of 2028 2000 qofi.exe 23 PID 2000 wrote to memory of 2028 2000 qofi.exe 23 PID 2000 wrote to memory of 2028 2000 qofi.exe 23 PID 2000 wrote to memory of 1288 2000 qofi.exe 29 PID 2000 wrote to memory of 1288 2000 qofi.exe 29 PID 2000 wrote to memory of 1288 2000 qofi.exe 29 PID 2000 wrote to memory of 1288 2000 qofi.exe 29 PID 2000 wrote to memory of 1288 2000 qofi.exe 29 PID 1288 wrote to memory of 1964 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 32 PID 1288 wrote to memory of 1964 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 32 PID 1288 wrote to memory of 1964 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 32 PID 1288 wrote to memory of 1964 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 32 PID 1288 wrote to memory of 1964 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 32 PID 1288 wrote to memory of 1964 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 32 PID 1288 wrote to memory of 1964 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 32 PID 1288 wrote to memory of 1964 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 32 PID 1288 wrote to memory of 1964 1288 b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe 32 PID 2000 wrote to memory of 332 2000 qofi.exe 34 PID 2000 wrote to memory of 332 2000 qofi.exe 34 PID 2000 wrote to memory of 332 2000 qofi.exe 34 PID 2000 wrote to memory of 332 2000 qofi.exe 34 PID 2000 wrote to memory of 332 2000 qofi.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Roaming\Vuvoq\qofi.exe"C:\Users\Admin\AppData\Roaming\Vuvoq\qofi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2000
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc63abe2e.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1964
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2028
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5ba13cd29dea05d90dff62f2879501084
SHA1689ac3860834fc312ff926cf7e410958499e816b
SHA2561240a78efbca85d8b5b81508a6cf971f642931b0a4c927c816b39b3b7be45f7a
SHA5126f3837679bc1c17adf5ed3385a718e456ff2c1ae91b047e65b392a1c943b0babac4bff83a47a2639ada8c3c5fcea2989d9aafa83b70bd8292ec2be77dabcee2e
-
Filesize
361KB
MD5eb901ad26f53b0356d4f5efc0c1af29e
SHA1d1cc72d2eca8ec58ad48f61ff385c6ff2259c8f4
SHA256436c297ef7905509b7f9ed751d370de515414889e3f1107af9e7edffd90b181e
SHA512a56c52b78230cd662960163ed91b673589d3d0943bb06b01c28e449abe46711730e19b8d491cc4f102e2133b2908bf716d4b41772dd4fb1f44293d02586625ed