Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe
-
Size
321KB
-
MD5
b90e2c831f24541353874a1d4f4f2c31
-
SHA1
f4979e9c7a59923a1742abec65c8c1d4dffc8b82
-
SHA256
4628ac78bc9d1f342986f9e38dcd74892223c1b41873ac71bf4288b8819199fe
-
SHA512
52c9c6560deb1cbc0f2b337fa47e01d1021e7d7bb60d79ed2c20a5a3b56154a43489445b8b69076238c5c107f824b6089b2f0dc90e44d4847a7cbe60a1db9aa6
-
SSDEEP
6144:tT+FQoCd70swMHScIOq1G/PVRnC2CkErfo21:4FhCxycBqwVRC2gc21
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2860 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 otmio.exe -
Loads dropped DLL 2 IoCs
pid Process 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F4363D88-6FEF-AD4F-FCEF-4765F9626478} = "C:\\Users\\Admin\\AppData\\Roaming\\Ecodc\\otmio.exe" otmio.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2544 set thread context of 2860 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language otmio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Privacy b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe 2176 otmio.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 2176 otmio.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2176 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2176 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2176 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2176 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 30 PID 2176 wrote to memory of 1120 2176 otmio.exe 19 PID 2176 wrote to memory of 1120 2176 otmio.exe 19 PID 2176 wrote to memory of 1120 2176 otmio.exe 19 PID 2176 wrote to memory of 1120 2176 otmio.exe 19 PID 2176 wrote to memory of 1120 2176 otmio.exe 19 PID 2176 wrote to memory of 1228 2176 otmio.exe 20 PID 2176 wrote to memory of 1228 2176 otmio.exe 20 PID 2176 wrote to memory of 1228 2176 otmio.exe 20 PID 2176 wrote to memory of 1228 2176 otmio.exe 20 PID 2176 wrote to memory of 1228 2176 otmio.exe 20 PID 2176 wrote to memory of 1276 2176 otmio.exe 21 PID 2176 wrote to memory of 1276 2176 otmio.exe 21 PID 2176 wrote to memory of 1276 2176 otmio.exe 21 PID 2176 wrote to memory of 1276 2176 otmio.exe 21 PID 2176 wrote to memory of 1276 2176 otmio.exe 21 PID 2176 wrote to memory of 628 2176 otmio.exe 25 PID 2176 wrote to memory of 628 2176 otmio.exe 25 PID 2176 wrote to memory of 628 2176 otmio.exe 25 PID 2176 wrote to memory of 628 2176 otmio.exe 25 PID 2176 wrote to memory of 628 2176 otmio.exe 25 PID 2176 wrote to memory of 2544 2176 otmio.exe 29 PID 2176 wrote to memory of 2544 2176 otmio.exe 29 PID 2176 wrote to memory of 2544 2176 otmio.exe 29 PID 2176 wrote to memory of 2544 2176 otmio.exe 29 PID 2176 wrote to memory of 2544 2176 otmio.exe 29 PID 2544 wrote to memory of 2860 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 31 PID 2544 wrote to memory of 2860 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 31 PID 2544 wrote to memory of 2860 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 31 PID 2544 wrote to memory of 2860 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 31 PID 2544 wrote to memory of 2860 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 31 PID 2544 wrote to memory of 2860 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 31 PID 2544 wrote to memory of 2860 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 31 PID 2544 wrote to memory of 2860 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 31 PID 2544 wrote to memory of 2860 2544 b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe 31 PID 2176 wrote to memory of 1804 2176 otmio.exe 34 PID 2176 wrote to memory of 1804 2176 otmio.exe 34 PID 2176 wrote to memory of 1804 2176 otmio.exe 34 PID 2176 wrote to memory of 1804 2176 otmio.exe 34 PID 2176 wrote to memory of 1804 2176 otmio.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1228
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b90e2c831f24541353874a1d4f4f2c31_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Roaming\Ecodc\otmio.exe"C:\Users\Admin\AppData\Roaming\Ecodc\otmio.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2176
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7f86c039.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:628
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5b2407f2bee98f1e499d29a8bc38b1d1d
SHA194301325c93fdaeb2c8b3feb2752fb4afc8da187
SHA2560924163a17013fcedf019751c2897934f8449aee00ef76e859e49f003267c499
SHA5127c6b8b264aef7a86478d6a8137dd587f43e241afe29d6e0366675e5460ac1d149b513916a6135d05528048c4155aa7cda5a5afef1e2460e6dd3664805693bc24
-
Filesize
321KB
MD562bd7ea704fa1e98b25ff743bf4a5450
SHA134901d50f25853d1ba20b255406f619330465e14
SHA256be6587f7dd725c6530ce3ede47ce92a34661015e15bcbde67aa4b92ed68f3f8d
SHA5125a1a640956fd5096b8e547a7a84abec77940623618b82b0b703bcf41aa7cfe443e8b8f3c9c6412de99efe44bd4972dc065d582e01ef47f0db713a71ee78a12c8