Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 10:18

General

  • Target

    b31376f097ec2118949ab822ab720491_JaffaCakes118.exe

  • Size

    276KB

  • MD5

    b31376f097ec2118949ab822ab720491

  • SHA1

    ab41e868c4ee3ba6480759f67d8d113e051b3208

  • SHA256

    add6c185e97290759f0130865f1719ee175555878d289def8cdacdc0a0dffa83

  • SHA512

    2568644f3e0e8130b38faa4d39781321b93bcd607fde677b20dbd7be0c97965f84ad8bd0d3251d942accb5b503bb7ddea0a8ed1cad28eeee116f6243180f4a0f

  • SSDEEP

    6144:HfFVzW9rUSUa4klU2SC9IZriNkyBr0i51eQwwAvsuA6e:HfFVerUSCqUFCLNkyBt1ekAvER

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1116
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1172
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1244
          • C:\Users\Admin\AppData\Local\Temp\b31376f097ec2118949ab822ab720491_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\b31376f097ec2118949ab822ab720491_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2340
            • C:\Users\Admin\AppData\Roaming\Jiax\ozism.exe
              "C:\Users\Admin\AppData\Roaming\Jiax\ozism.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2784
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc5f46f15.bat"
              3⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:2976
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1528

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmpc5f46f15.bat

            Filesize

            271B

            MD5

            12d057d6bdaab78523802f7d53658f23

            SHA1

            3e289770468e32f48afe4fa357ec7c17c70c398e

            SHA256

            f7e74c9bde3746f0289d336cf511356d9f6bc6184279dd7dd5133b71d2e4540a

            SHA512

            7ffdba7e289a2876ba43a29038804dc1badd07600716b97f84edf2a54f6c6fbb8eb19a35f787ebffe0abd705580446d22a5311315b53c6d2786a9353e3d4de57

          • C:\Users\Admin\AppData\Roaming\Iguly\qefa.atb

            Filesize

            380B

            MD5

            fdc8d1a15ea8a5cf0f073f98f02fbacf

            SHA1

            8238f8af7da0200d9284a4eddcc0e141480e8c29

            SHA256

            b51796453fec871461b7318b594458d8d74a85f69f0a16976a5488f4e42c8484

            SHA512

            a6a81f361c46bee92507bab583396f7e200497ab4edba535ab3a4a8e194c57f8d87edb6a0cbaff63a1a0b47713d11040cf7cae170dfa610f30cd75fed299b22d

          • C:\Users\Admin\AppData\Roaming\Jiax\ozism.exe

            Filesize

            276KB

            MD5

            270046cd5d28e1cc3af0da7e79f65e8b

            SHA1

            dbae813b83b2ebfe4df98717849c03d91debe43f

            SHA256

            1f092c5e740f63c3a40246a6ae554e8bd62ee82706d27b12ad6d8933ac6a9a58

            SHA512

            b06bfc7071287c68c758480ae502e82a09f3f46aa8b79e7b7467a07452875abf0babbf1c39a7b0f747aa34014252718554ac75b0056ee9f6501049d25b556c04

          • memory/1116-18-0x0000000001FF0000-0x0000000002031000-memory.dmp

            Filesize

            260KB

          • memory/1116-20-0x0000000001FF0000-0x0000000002031000-memory.dmp

            Filesize

            260KB

          • memory/1116-22-0x0000000001FF0000-0x0000000002031000-memory.dmp

            Filesize

            260KB

          • memory/1116-24-0x0000000001FF0000-0x0000000002031000-memory.dmp

            Filesize

            260KB

          • memory/1116-26-0x0000000001FF0000-0x0000000002031000-memory.dmp

            Filesize

            260KB

          • memory/1172-30-0x0000000002010000-0x0000000002051000-memory.dmp

            Filesize

            260KB

          • memory/1172-34-0x0000000002010000-0x0000000002051000-memory.dmp

            Filesize

            260KB

          • memory/1172-32-0x0000000002010000-0x0000000002051000-memory.dmp

            Filesize

            260KB

          • memory/1172-36-0x0000000002010000-0x0000000002051000-memory.dmp

            Filesize

            260KB

          • memory/1244-39-0x0000000002EA0000-0x0000000002EE1000-memory.dmp

            Filesize

            260KB

          • memory/1244-40-0x0000000002EA0000-0x0000000002EE1000-memory.dmp

            Filesize

            260KB

          • memory/1244-41-0x0000000002EA0000-0x0000000002EE1000-memory.dmp

            Filesize

            260KB

          • memory/1244-42-0x0000000002EA0000-0x0000000002EE1000-memory.dmp

            Filesize

            260KB

          • memory/1528-49-0x0000000000350000-0x0000000000391000-memory.dmp

            Filesize

            260KB

          • memory/1528-51-0x0000000000350000-0x0000000000391000-memory.dmp

            Filesize

            260KB

          • memory/1528-47-0x0000000000350000-0x0000000000391000-memory.dmp

            Filesize

            260KB

          • memory/1528-45-0x0000000000350000-0x0000000000391000-memory.dmp

            Filesize

            260KB

          • memory/2340-79-0x0000000000320000-0x0000000000321000-memory.dmp

            Filesize

            4KB

          • memory/2340-59-0x0000000000320000-0x0000000000321000-memory.dmp

            Filesize

            4KB

          • memory/2340-56-0x0000000000500000-0x0000000000541000-memory.dmp

            Filesize

            260KB

          • memory/2340-55-0x0000000000500000-0x0000000000541000-memory.dmp

            Filesize

            260KB

          • memory/2340-138-0x0000000000500000-0x0000000000541000-memory.dmp

            Filesize

            260KB

          • memory/2340-58-0x0000000000500000-0x0000000000541000-memory.dmp

            Filesize

            260KB

          • memory/2340-65-0x0000000000320000-0x0000000000321000-memory.dmp

            Filesize

            4KB

          • memory/2340-139-0x00000000775E0000-0x00000000775E1000-memory.dmp

            Filesize

            4KB

          • memory/2340-67-0x0000000000320000-0x0000000000321000-memory.dmp

            Filesize

            4KB

          • memory/2340-140-0x0000000000320000-0x0000000000321000-memory.dmp

            Filesize

            4KB

          • memory/2340-71-0x0000000000320000-0x0000000000321000-memory.dmp

            Filesize

            4KB

          • memory/2340-73-0x0000000000320000-0x0000000000321000-memory.dmp

            Filesize

            4KB

          • memory/2340-75-0x0000000000320000-0x0000000000321000-memory.dmp

            Filesize

            4KB

          • memory/2340-61-0x0000000000320000-0x0000000000321000-memory.dmp

            Filesize

            4KB

          • memory/2340-77-0x0000000000320000-0x0000000000321000-memory.dmp

            Filesize

            4KB

          • memory/2340-63-0x0000000000320000-0x0000000000321000-memory.dmp

            Filesize

            4KB

          • memory/2340-54-0x0000000000500000-0x0000000000541000-memory.dmp

            Filesize

            260KB

          • memory/2340-57-0x0000000000500000-0x0000000000541000-memory.dmp

            Filesize

            260KB

          • memory/2340-69-0x0000000000320000-0x0000000000321000-memory.dmp

            Filesize

            4KB

          • memory/2340-164-0x0000000000270000-0x00000000002B1000-memory.dmp

            Filesize

            260KB

          • memory/2340-165-0x00000000002C0000-0x0000000000307000-memory.dmp

            Filesize

            284KB

          • memory/2340-166-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2340-167-0x0000000000500000-0x0000000000541000-memory.dmp

            Filesize

            260KB

          • memory/2340-0-0x0000000000270000-0x00000000002B1000-memory.dmp

            Filesize

            260KB

          • memory/2340-1-0x00000000002C0000-0x0000000000307000-memory.dmp

            Filesize

            284KB

          • memory/2340-5-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2340-4-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2340-3-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2340-2-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2784-15-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/2784-16-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2784-285-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/2784-286-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/2784-287-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB