Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 11:15
Static task
static1
Behavioral task
behavioral1
Sample
b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe
-
Size
194KB
-
MD5
b33f1b9d59cd752a56b41ed9687793e0
-
SHA1
c195e7858bcdace58f302f27a2996a89ec4f2793
-
SHA256
a60d6247af46ae80515f179c406b07d4ce1f9705f13d98cd2c9114c7de1fd64f
-
SHA512
7a8c7aeb1b546ef43b1ec322278e35310d0f410ea54277540f80849f12e67d1b245e246875b1971f84ec7e8c8a3feb950ddf6eec7426acec13d80fdb1186f44a
-
SSDEEP
3072:U27BeCgrio6Fgq+hZSfp5qZf0oeHCc4LBtWvM:U6wC8hq9wVQzJU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2684 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2828 lify.exe -
Loads dropped DLL 2 IoCs
pid Process 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Piorv = "C:\\Users\\Admin\\AppData\\Roaming\\Xuecyq\\lify.exe" lify.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1824 set thread context of 2684 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lify.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Privacy b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\029700C8-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe 2828 lify.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeSecurityPrivilege 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe Token: SeSecurityPrivilege 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe Token: SeSecurityPrivilege 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe Token: SeSecurityPrivilege 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe Token: SeSecurityPrivilege 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe Token: SeSecurityPrivilege 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe Token: SeSecurityPrivilege 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe Token: SeSecurityPrivilege 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe Token: SeSecurityPrivilege 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe Token: SeSecurityPrivilege 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe Token: SeManageVolumePrivilege 1852 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1852 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1852 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1852 WinMail.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2828 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 30 PID 1824 wrote to memory of 2828 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 30 PID 1824 wrote to memory of 2828 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 30 PID 1824 wrote to memory of 2828 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 30 PID 2828 wrote to memory of 1116 2828 lify.exe 19 PID 2828 wrote to memory of 1116 2828 lify.exe 19 PID 2828 wrote to memory of 1116 2828 lify.exe 19 PID 2828 wrote to memory of 1116 2828 lify.exe 19 PID 2828 wrote to memory of 1116 2828 lify.exe 19 PID 2828 wrote to memory of 1180 2828 lify.exe 20 PID 2828 wrote to memory of 1180 2828 lify.exe 20 PID 2828 wrote to memory of 1180 2828 lify.exe 20 PID 2828 wrote to memory of 1180 2828 lify.exe 20 PID 2828 wrote to memory of 1180 2828 lify.exe 20 PID 2828 wrote to memory of 1208 2828 lify.exe 21 PID 2828 wrote to memory of 1208 2828 lify.exe 21 PID 2828 wrote to memory of 1208 2828 lify.exe 21 PID 2828 wrote to memory of 1208 2828 lify.exe 21 PID 2828 wrote to memory of 1208 2828 lify.exe 21 PID 2828 wrote to memory of 640 2828 lify.exe 25 PID 2828 wrote to memory of 640 2828 lify.exe 25 PID 2828 wrote to memory of 640 2828 lify.exe 25 PID 2828 wrote to memory of 640 2828 lify.exe 25 PID 2828 wrote to memory of 640 2828 lify.exe 25 PID 2828 wrote to memory of 1824 2828 lify.exe 29 PID 2828 wrote to memory of 1824 2828 lify.exe 29 PID 2828 wrote to memory of 1824 2828 lify.exe 29 PID 2828 wrote to memory of 1824 2828 lify.exe 29 PID 2828 wrote to memory of 1824 2828 lify.exe 29 PID 1824 wrote to memory of 2684 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 32 PID 1824 wrote to memory of 2684 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 32 PID 1824 wrote to memory of 2684 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 32 PID 1824 wrote to memory of 2684 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 32 PID 1824 wrote to memory of 2684 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 32 PID 1824 wrote to memory of 2684 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 32 PID 1824 wrote to memory of 2684 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 32 PID 1824 wrote to memory of 2684 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 32 PID 1824 wrote to memory of 2684 1824 b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe 32 PID 2828 wrote to memory of 1784 2828 lify.exe 34 PID 2828 wrote to memory of 1784 2828 lify.exe 34 PID 2828 wrote to memory of 1784 2828 lify.exe 34 PID 2828 wrote to memory of 1784 2828 lify.exe 34 PID 2828 wrote to memory of 1784 2828 lify.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b33f1b9d59cd752a56b41ed9687793e0_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Roaming\Xuecyq\lify.exe"C:\Users\Admin\AppData\Roaming\Xuecyq\lify.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp3bc864fd.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:640
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1852
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD590ae0b4b5f01791be2a379c37c66c490
SHA1ed2cf1054a90eb14948882dfaad0391e8dcaa67d
SHA25659cac2649a37e789d9c98da633abaf5d8dfea7c8d23a04915a282028c4d215b2
SHA512ef270e60a84a628369a793e75b45cc07e92bbb920b3574e1e07c3bcf0ddc7a23d082a25f63f3b769567c18e1a05a0b9063d5610e4df2a651e975be6a8e5aaf3f
-
Filesize
271B
MD59ceffa13223049c9ae26a686f241f986
SHA1423232e50d8eabf59c9d02666aa4f04d1d277480
SHA256c6ceff990328a0609756f16bcc830c48e21bc00343d1b78c43de11de745d6218
SHA5122d5018c13fef12cc42a9d3acae8365ba8eafa83171ef3da8d40affc8fbe898fd0357ca94db55f3e7589d7d12e93d4a0d9e583f223b222b808f2e52f01e7447ef
-
Filesize
4KB
MD5317405fffcdfa3b9f365b3096365dd16
SHA1c09f90b772acbeb3bd14b3793cc16762fbad88e3
SHA25656f2d8b4d55d2ee67441c6c7da6e4919387932a3b3f9950eef6100c4c7bb2deb
SHA512b04333b0df82f1d2d1db472c49ad306c1487481184217470ecf4dc4d34b7be0f3d54700de8c816eaee0c14330040a4c07775a9072ac52dec2aeec53c04d93718
-
Filesize
4KB
MD5c72457fb49b47662c395ca60d3164891
SHA1b32977238be9812694629a4470e6341afb5bb960
SHA256ff3feda13163ed0f5adfd877e434b08da2e365165d4cef2393faaeb0be855909
SHA51263ae9cf657bc7a26f456dc6791755b17a4acadc7bf181734334184d094ca213e73e5868efa478585c449a038e20785f10af74502c46f18cd73520260a4521e48
-
Filesize
194KB
MD5c8c59c7bd954cb4d8fa05cf517347039
SHA19cf75eaf5a06828db7a184e5bbf270614ed90118
SHA256dff786e946cca8e61a37385d91ebcef72426c2cf9214dabcade8228abd493a78
SHA512a18c78dc5935424b937f06a54810cd62922dd2b0bc66dd42de1f16a901ba3889619995c95fa82154e914edba4a701d3d717aac11b020ecc42751020079786efd