Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 13:01
Static task
static1
Behavioral task
behavioral1
Sample
b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe
-
Size
278KB
-
MD5
b38d3c140612e43bc8ba91a1c351b702
-
SHA1
c79aebd38bdbb49c850a20850efec58d6f9749de
-
SHA256
a52c1e62a03f1904cbc724721fd07fafff37c284ed608df236edd4273290192a
-
SHA512
6a2ea02771e848c54ea27c6395ea422054010849f3df3223aeec1b88df437fa9e836ed295cd8326daba10739e88055071127ee2f6ad7194eecab6601a2a27424
-
SSDEEP
6144:9p4bOG6rzysDrwsSSY5krD77q3UwQi7CQCAEzoPS:9poZTkrwsSSYWn77OUZi73CToP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2740 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2252 inos.exe -
Loads dropped DLL 2 IoCs
pid Process 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\{75DA6328-6F30-AD4F-96DD-2BAD86C808B0} = "C:\\Users\\Admin\\AppData\\Roaming\\Ikso\\inos.exe" inos.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2376 set thread context of 2740 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe 2252 inos.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe Token: SeSecurityPrivilege 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe Token: SeSecurityPrivilege 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 2252 inos.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2252 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2252 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2252 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2252 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 30 PID 2252 wrote to memory of 1096 2252 inos.exe 19 PID 2252 wrote to memory of 1096 2252 inos.exe 19 PID 2252 wrote to memory of 1096 2252 inos.exe 19 PID 2252 wrote to memory of 1096 2252 inos.exe 19 PID 2252 wrote to memory of 1096 2252 inos.exe 19 PID 2252 wrote to memory of 1160 2252 inos.exe 20 PID 2252 wrote to memory of 1160 2252 inos.exe 20 PID 2252 wrote to memory of 1160 2252 inos.exe 20 PID 2252 wrote to memory of 1160 2252 inos.exe 20 PID 2252 wrote to memory of 1160 2252 inos.exe 20 PID 2252 wrote to memory of 1196 2252 inos.exe 21 PID 2252 wrote to memory of 1196 2252 inos.exe 21 PID 2252 wrote to memory of 1196 2252 inos.exe 21 PID 2252 wrote to memory of 1196 2252 inos.exe 21 PID 2252 wrote to memory of 1196 2252 inos.exe 21 PID 2252 wrote to memory of 1268 2252 inos.exe 23 PID 2252 wrote to memory of 1268 2252 inos.exe 23 PID 2252 wrote to memory of 1268 2252 inos.exe 23 PID 2252 wrote to memory of 1268 2252 inos.exe 23 PID 2252 wrote to memory of 1268 2252 inos.exe 23 PID 2252 wrote to memory of 2376 2252 inos.exe 29 PID 2252 wrote to memory of 2376 2252 inos.exe 29 PID 2252 wrote to memory of 2376 2252 inos.exe 29 PID 2252 wrote to memory of 2376 2252 inos.exe 29 PID 2252 wrote to memory of 2376 2252 inos.exe 29 PID 2376 wrote to memory of 2740 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2740 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2740 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2740 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2740 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2740 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2740 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2740 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2740 2376 b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1096
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b38d3c140612e43bc8ba91a1c351b702_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Roaming\Ikso\inos.exe"C:\Users\Admin\AppData\Roaming\Ikso\inos.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2252
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7f1f3c77.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5e160bf389ae221b1096e0d79ba75081a
SHA12195918f101ba3bd0179c8f1c7c5a06f656eea21
SHA256d2087d9bb3b114b392744c9b904d1a2fb7d70c56d495114a3e4a8e0563e95256
SHA5124ad203868db5f233d8ccfc1ab391c4e46168ed66c065cd0d37c2670c735e296ccc854d50d0f0e0529820e0c1d75c0d2a8071538774bbcb00a10a87a48caca241
-
Filesize
380B
MD5d04dd59e2465ba29b4fd375c74b88031
SHA1709e6cd7522024eb98fdb4280fec293181875a2f
SHA256813f243702a1325da9a4ccdf472c4783ae12f85269d8849bae7969f29c626261
SHA512f66764588fa84e5f9b16688004c57f1b53fc4cbff2b84a84bd72f199f5f3f0ec124c21ca6d4e72ab6148b49b31a98136fb5a7b382a92dcf69b27f634b70859a3
-
Filesize
278KB
MD573606ce3408f67b2b11acd90eda03dc7
SHA1ffed4920d416d845e3928b068fa836bb821d67d3
SHA256f08c3574d2f47ee4ba07f7ead24d7d771a29f19165b115a546042c44495ababd
SHA5121f578b65346f98a814dddb61aca4ee82218a1b3d1aa0fd4c76c35875b94bc1ef87ad7c50aa44e9bd5d70ef8bd73146d599584db93f977c0d92af0ee29565b86c