Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe
-
Size
272KB
-
MD5
b45faf6f673e52480d221f931bf62300
-
SHA1
bee80c75eab484e944adc540f19dee6d0f189c9c
-
SHA256
9fe3f8a049995fac58500d8dafa4e39cd300993c27f85e7fb6e2448bfbe00547
-
SHA512
cee9ae3fa3bfa0d0606b4305034325a4f4481bdca2bd4589e08836deb911c2d7f18611088c0e111044877c2294052ca1fbeedc8c82c44a89db2fb05c6c75ad81
-
SSDEEP
6144:ZbSMuKl1iKGDJQRQ9NzkcJ6OGlOZjcn44rRL:ZbSMVlJGDGS9JL6ROSn44NL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 292 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 yqbe.exe -
Loads dropped DLL 1 IoCs
pid Process 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\{278F5008-6814-AD4F-E8EF-460FE6556512} = "C:\\Users\\Admin\\AppData\\Roaming\\Wuhimo\\yqbe.exe" yqbe.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2196 set thread context of 292 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Privacy b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe 2772 yqbe.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe Token: SeSecurityPrivilege 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe Token: SeSecurityPrivilege 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 2772 yqbe.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2772 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2772 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2772 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2772 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 30 PID 2772 wrote to memory of 1116 2772 yqbe.exe 19 PID 2772 wrote to memory of 1116 2772 yqbe.exe 19 PID 2772 wrote to memory of 1116 2772 yqbe.exe 19 PID 2772 wrote to memory of 1116 2772 yqbe.exe 19 PID 2772 wrote to memory of 1116 2772 yqbe.exe 19 PID 2772 wrote to memory of 1176 2772 yqbe.exe 20 PID 2772 wrote to memory of 1176 2772 yqbe.exe 20 PID 2772 wrote to memory of 1176 2772 yqbe.exe 20 PID 2772 wrote to memory of 1176 2772 yqbe.exe 20 PID 2772 wrote to memory of 1176 2772 yqbe.exe 20 PID 2772 wrote to memory of 1204 2772 yqbe.exe 21 PID 2772 wrote to memory of 1204 2772 yqbe.exe 21 PID 2772 wrote to memory of 1204 2772 yqbe.exe 21 PID 2772 wrote to memory of 1204 2772 yqbe.exe 21 PID 2772 wrote to memory of 1204 2772 yqbe.exe 21 PID 2772 wrote to memory of 1624 2772 yqbe.exe 23 PID 2772 wrote to memory of 1624 2772 yqbe.exe 23 PID 2772 wrote to memory of 1624 2772 yqbe.exe 23 PID 2772 wrote to memory of 1624 2772 yqbe.exe 23 PID 2772 wrote to memory of 1624 2772 yqbe.exe 23 PID 2772 wrote to memory of 2196 2772 yqbe.exe 29 PID 2772 wrote to memory of 2196 2772 yqbe.exe 29 PID 2772 wrote to memory of 2196 2772 yqbe.exe 29 PID 2772 wrote to memory of 2196 2772 yqbe.exe 29 PID 2772 wrote to memory of 2196 2772 yqbe.exe 29 PID 2196 wrote to memory of 292 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 31 PID 2196 wrote to memory of 292 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 31 PID 2196 wrote to memory of 292 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 31 PID 2196 wrote to memory of 292 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 31 PID 2196 wrote to memory of 292 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 31 PID 2196 wrote to memory of 292 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 31 PID 2196 wrote to memory of 292 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 31 PID 2196 wrote to memory of 292 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 31 PID 2196 wrote to memory of 292 2196 b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b45faf6f673e52480d221f931bf62300_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Roaming\Wuhimo\yqbe.exe"C:\Users\Admin\AppData\Roaming\Wuhimo\yqbe.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp13cb40a8.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:292
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD50c70539ac37878d7fb411e481f6daaf9
SHA1740801919616b52e63db9cbec221d111edb3de4c
SHA256a68ec3fa52692e7803a8750d408b4630b72448be6109fcffa5b985830ce8a2ff
SHA512ba5e1df3010fd3700cb7e75e96c826ef207802fef190f4784d9bb5a3ac73bb71de3d4760f3d6a64dbfd3dbee9a8b103475f644333db2448341891d004c43ccad
-
Filesize
380B
MD5e208dd635c6cb98a0083741b97a35e75
SHA1880b97cdc931ae0f1ef30f9f8c33d82a4e679d43
SHA2564d46548c84e724f4022252633996cf9ed565e9cafde0f6e1b9793fb98be8df46
SHA5126f000617ac7fa71bcef0917dba426aa63d029cd5689418906588c9c26b5d37de94cfb12efa62723d7214d47116d559f00d14026dad94c76ce1658cf4f2e3325e
-
Filesize
272KB
MD5144532ebd6edcc0535c914c0640231fc
SHA14b0f696e7f52fe864594319dd44c7c4457e6b865
SHA256558e43e6ded79be726b7da9ea17078d8021d8a014abec0633db8dc541e3ab29c
SHA512e4d49574f534fad219cefc91128cac4a326110761d87cda45604879608e9563088ef6badc7457b5c32cb233a679cc82cb4473719b05ddbbc52aecb7dda374a73