Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 07:03

General

  • Target

    b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe

  • Size

    361KB

  • MD5

    b28618a3385f05412e6cf6c12cbaedca

  • SHA1

    98b8a335351a88477690bec56f5305c1253bedc0

  • SHA256

    e87c93d5be65ae5657d3ec5ae88d6db96579e1e731d01a02b520ebab366608be

  • SHA512

    7d2540d84f49d77f402c25bdd64ee8f11aec0ca497a88c9983ed531ed90a9e56d7d96774b81209346475497a9b6d68ce5a87403f659b74344b4154ea3ea91e99

  • SSDEEP

    6144:986rJmm5lnW2PRTTC0VRNhPzWsnxiP8Audn:9pP5IWBhVPSsno8r9

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1104
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1172
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1196
          • C:\Users\Admin\AppData\Local\Temp\b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\b28618a3385f05412e6cf6c12cbaedca_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:1288
            • C:\Users\Admin\AppData\Roaming\Vuvoq\qofi.exe
              "C:\Users\Admin\AppData\Roaming\Vuvoq\qofi.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2000
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc63abe2e.bat"
              3⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:1964
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:2028
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:332

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\tmpc63abe2e.bat

              Filesize

              271B

              MD5

              ba13cd29dea05d90dff62f2879501084

              SHA1

              689ac3860834fc312ff926cf7e410958499e816b

              SHA256

              1240a78efbca85d8b5b81508a6cf971f642931b0a4c927c816b39b3b7be45f7a

              SHA512

              6f3837679bc1c17adf5ed3385a718e456ff2c1ae91b047e65b392a1c943b0babac4bff83a47a2639ada8c3c5fcea2989d9aafa83b70bd8292ec2be77dabcee2e

            • \Users\Admin\AppData\Roaming\Vuvoq\qofi.exe

              Filesize

              361KB

              MD5

              eb901ad26f53b0356d4f5efc0c1af29e

              SHA1

              d1cc72d2eca8ec58ad48f61ff385c6ff2259c8f4

              SHA256

              436c297ef7905509b7f9ed751d370de515414889e3f1107af9e7edffd90b181e

              SHA512

              a56c52b78230cd662960163ed91b673589d3d0943bb06b01c28e449abe46711730e19b8d491cc4f102e2133b2908bf716d4b41772dd4fb1f44293d02586625ed

            • memory/1104-25-0x0000000002180000-0x00000000021C4000-memory.dmp

              Filesize

              272KB

            • memory/1104-22-0x0000000002180000-0x00000000021C4000-memory.dmp

              Filesize

              272KB

            • memory/1104-26-0x0000000002180000-0x00000000021C4000-memory.dmp

              Filesize

              272KB

            • memory/1104-20-0x0000000002180000-0x00000000021C4000-memory.dmp

              Filesize

              272KB

            • memory/1104-18-0x0000000002180000-0x00000000021C4000-memory.dmp

              Filesize

              272KB

            • memory/1172-30-0x0000000001FD0000-0x0000000002014000-memory.dmp

              Filesize

              272KB

            • memory/1172-32-0x0000000001FD0000-0x0000000002014000-memory.dmp

              Filesize

              272KB

            • memory/1172-34-0x0000000001FD0000-0x0000000002014000-memory.dmp

              Filesize

              272KB

            • memory/1172-36-0x0000000001FD0000-0x0000000002014000-memory.dmp

              Filesize

              272KB

            • memory/1196-42-0x00000000024D0000-0x0000000002514000-memory.dmp

              Filesize

              272KB

            • memory/1196-41-0x00000000024D0000-0x0000000002514000-memory.dmp

              Filesize

              272KB

            • memory/1196-39-0x00000000024D0000-0x0000000002514000-memory.dmp

              Filesize

              272KB

            • memory/1196-40-0x00000000024D0000-0x0000000002514000-memory.dmp

              Filesize

              272KB

            • memory/1288-65-0x0000000000460000-0x0000000000461000-memory.dmp

              Filesize

              4KB

            • memory/1288-1-0x0000000000350000-0x00000000003B2000-memory.dmp

              Filesize

              392KB

            • memory/1288-79-0x0000000000460000-0x0000000000461000-memory.dmp

              Filesize

              4KB

            • memory/1288-77-0x0000000000460000-0x0000000000461000-memory.dmp

              Filesize

              4KB

            • memory/1288-75-0x0000000000460000-0x0000000000461000-memory.dmp

              Filesize

              4KB

            • memory/1288-73-0x0000000000460000-0x0000000000461000-memory.dmp

              Filesize

              4KB

            • memory/1288-71-0x0000000000460000-0x0000000000461000-memory.dmp

              Filesize

              4KB

            • memory/1288-69-0x0000000000460000-0x0000000000461000-memory.dmp

              Filesize

              4KB

            • memory/1288-67-0x0000000000460000-0x0000000000461000-memory.dmp

              Filesize

              4KB

            • memory/1288-142-0x0000000000460000-0x0000000000461000-memory.dmp

              Filesize

              4KB

            • memory/1288-63-0x0000000000460000-0x0000000000461000-memory.dmp

              Filesize

              4KB

            • memory/1288-61-0x0000000000460000-0x0000000000461000-memory.dmp

              Filesize

              4KB

            • memory/1288-59-0x0000000000460000-0x0000000000461000-memory.dmp

              Filesize

              4KB

            • memory/1288-57-0x00000000004C0000-0x0000000000504000-memory.dmp

              Filesize

              272KB

            • memory/1288-56-0x00000000004C0000-0x0000000000504000-memory.dmp

              Filesize

              272KB

            • memory/1288-55-0x00000000004C0000-0x0000000000504000-memory.dmp

              Filesize

              272KB

            • memory/1288-54-0x00000000004C0000-0x0000000000504000-memory.dmp

              Filesize

              272KB

            • memory/1288-0-0x0000000000300000-0x0000000000344000-memory.dmp

              Filesize

              272KB

            • memory/1288-165-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1288-166-0x0000000000350000-0x00000000003B2000-memory.dmp

              Filesize

              392KB

            • memory/1288-167-0x00000000004C0000-0x0000000000504000-memory.dmp

              Filesize

              272KB

            • memory/1288-4-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1288-3-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1288-141-0x0000000077430000-0x0000000077431000-memory.dmp

              Filesize

              4KB

            • memory/1288-58-0x00000000004C0000-0x0000000000504000-memory.dmp

              Filesize

              272KB

            • memory/1288-140-0x00000000004C0000-0x0000000000504000-memory.dmp

              Filesize

              272KB

            • memory/1288-2-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1288-7-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2000-16-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2000-15-0x0000000000400000-0x0000000000462000-memory.dmp

              Filesize

              392KB

            • memory/2000-289-0x0000000000400000-0x0000000000462000-memory.dmp

              Filesize

              392KB

            • memory/2000-290-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2028-45-0x0000000002200000-0x0000000002244000-memory.dmp

              Filesize

              272KB

            • memory/2028-47-0x0000000002200000-0x0000000002244000-memory.dmp

              Filesize

              272KB

            • memory/2028-49-0x0000000002200000-0x0000000002244000-memory.dmp

              Filesize

              272KB

            • memory/2028-51-0x0000000002200000-0x0000000002244000-memory.dmp

              Filesize

              272KB