Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe
-
Size
344KB
-
MD5
b9ff76be44a1a36bcf87495e9cfbe551
-
SHA1
3782d50d88de2e19e8a744f284e0ce02e9fdaf04
-
SHA256
f78d2118f3318591ec609286ba5ffafcd9653481f7d0ddcf16adc4d9e376d558
-
SHA512
6a2c5170031de6965e30ba14eea2cf93cad03d1dc8dc52092f5e1fb6dfc0fb35b630dc39bf61743144550ea9677b13f0cba0406a52624fde7c03154c49a1a4ef
-
SSDEEP
6144:Iquqge6VH0pwpMnE+XF+DcVkmi3prmICCK:Iege6VH0ppnZXF6gPi3prmICCK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2984 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2296 maoma1.exe 2468 qiuqiu.exe -
Loads dropped DLL 9 IoCs
pid Process 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 2296 maoma1.exe 2296 maoma1.exe 2296 maoma1.exe 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 2468 qiuqiu.exe 2468 qiuqiu.exe 2468 qiuqiu.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\qiuqi1.bat b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe File created C:\Program Files\Common Files\maoma1.exe b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe File created C:\Program Files\Common Files\qiuqi1.dll b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language maoma1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qiuqiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1}\InProcServer32 qiuqiu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID qiuqiu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1} qiuqiu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1}\InProcServer32\ = "C:\\Program Files\\Common Files\\qiuqi1.dll" qiuqiu.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1000 wrote to memory of 2296 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 31 PID 1000 wrote to memory of 2296 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 31 PID 1000 wrote to memory of 2296 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 31 PID 1000 wrote to memory of 2296 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 31 PID 1000 wrote to memory of 2296 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 31 PID 1000 wrote to memory of 2296 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 31 PID 1000 wrote to memory of 2296 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 31 PID 1000 wrote to memory of 2468 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 32 PID 1000 wrote to memory of 2468 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 32 PID 1000 wrote to memory of 2468 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 32 PID 1000 wrote to memory of 2468 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 32 PID 1000 wrote to memory of 2468 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 32 PID 1000 wrote to memory of 2468 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 32 PID 1000 wrote to memory of 2468 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 32 PID 2468 wrote to memory of 2832 2468 qiuqiu.exe 33 PID 2468 wrote to memory of 2832 2468 qiuqiu.exe 33 PID 2468 wrote to memory of 2832 2468 qiuqiu.exe 33 PID 2468 wrote to memory of 2832 2468 qiuqiu.exe 33 PID 2468 wrote to memory of 2832 2468 qiuqiu.exe 33 PID 2468 wrote to memory of 2832 2468 qiuqiu.exe 33 PID 2468 wrote to memory of 2832 2468 qiuqiu.exe 33 PID 1000 wrote to memory of 2984 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 35 PID 1000 wrote to memory of 2984 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 35 PID 1000 wrote to memory of 2984 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 35 PID 1000 wrote to memory of 2984 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 35 PID 1000 wrote to memory of 2984 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 35 PID 1000 wrote to memory of 2984 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 35 PID 1000 wrote to memory of 2984 1000 b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9ff76be44a1a36bcf87495e9cfbe551_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Program Files\Common Files\maoma1.exe"C:\Program Files\Common Files\maoma1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Documents and Settings\qiuqiu.exe"C:\Documents and Settings\qiuqiu.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\DOCUME~1\qiuqiu.exe3⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del C:\Users\Admin\AppData\Local\Temp\B9FF76~1.EXE2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.0MB
MD5a27ba40d7dd9d40e473497c5d4eee0c0
SHA149ae79ae140faacf3df8e25ee2a11529ae792172
SHA256622cc2366581d203b1352139ab5b2200849e9995625ed8610f9edb786c816136
SHA512abf17af3a9c0c3c274c6c5c74102b29bc8c4a3fa78d57ff8a28c938e8e65fac8d2f824485d92e93c540d102bfce64eab45aa4f9de33506de5f5f726c3991e869
-
Filesize
24.0MB
MD5eb52dc7173c72b3222cb4e0696031b94
SHA19cea6560028c4e9c3b3a89d07c1fcc05e47b84b5
SHA256be1e30ecb3051e0034d5a5fab56e1ce1530d499b6d6d4f0a9f401df0ae419ed1
SHA51220fff4f0bbe87fbc2a9785154e132e0ba93dac75d6364283072c70cea50906e7d604a7bbe1c49d586c8a5907f58ddb6ecea8bb57c396a6ea1c51f86357dd3b9a