Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe
-
Size
321KB
-
MD5
bf3b291889020a85dd1a03a61ba02b51
-
SHA1
7d3cd2e626c247b455087ace1a1fb7d0a3f55437
-
SHA256
adf7695928a9042724559530c384dfd6ed0e11e32907613e0412343efb9110c4
-
SHA512
c3c2239ab241ee4cd0d9bda50674cabf4ccc279d9ff38ea0032974a05d1ad65d5f1d4db2c520bc44622a671b557e612f0271cf4d3678dd6cb4f4c50b5814ef58
-
SSDEEP
6144:cT+FQobd7OswMHScIOq1G/PyRnC2CkErfor:fFhbDycBqwyRC2gcr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2320 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2376 awqyaz.exe -
Loads dropped DLL 2 IoCs
pid Process 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\{75DA6328-6F30-AD4F-96DD-2BAD86C808B0} = "C:\\Users\\Admin\\AppData\\Roaming\\Exunb\\awqyaz.exe" awqyaz.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2120 set thread context of 2320 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe 2376 awqyaz.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 2376 awqyaz.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2376 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2376 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2376 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2376 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 31 PID 2376 wrote to memory of 1188 2376 awqyaz.exe 19 PID 2376 wrote to memory of 1188 2376 awqyaz.exe 19 PID 2376 wrote to memory of 1188 2376 awqyaz.exe 19 PID 2376 wrote to memory of 1188 2376 awqyaz.exe 19 PID 2376 wrote to memory of 1188 2376 awqyaz.exe 19 PID 2376 wrote to memory of 1300 2376 awqyaz.exe 20 PID 2376 wrote to memory of 1300 2376 awqyaz.exe 20 PID 2376 wrote to memory of 1300 2376 awqyaz.exe 20 PID 2376 wrote to memory of 1300 2376 awqyaz.exe 20 PID 2376 wrote to memory of 1300 2376 awqyaz.exe 20 PID 2376 wrote to memory of 1360 2376 awqyaz.exe 21 PID 2376 wrote to memory of 1360 2376 awqyaz.exe 21 PID 2376 wrote to memory of 1360 2376 awqyaz.exe 21 PID 2376 wrote to memory of 1360 2376 awqyaz.exe 21 PID 2376 wrote to memory of 1360 2376 awqyaz.exe 21 PID 2376 wrote to memory of 1160 2376 awqyaz.exe 25 PID 2376 wrote to memory of 1160 2376 awqyaz.exe 25 PID 2376 wrote to memory of 1160 2376 awqyaz.exe 25 PID 2376 wrote to memory of 1160 2376 awqyaz.exe 25 PID 2376 wrote to memory of 1160 2376 awqyaz.exe 25 PID 2376 wrote to memory of 2120 2376 awqyaz.exe 30 PID 2376 wrote to memory of 2120 2376 awqyaz.exe 30 PID 2376 wrote to memory of 2120 2376 awqyaz.exe 30 PID 2376 wrote to memory of 2120 2376 awqyaz.exe 30 PID 2376 wrote to memory of 2120 2376 awqyaz.exe 30 PID 2120 wrote to memory of 2320 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 32 PID 2120 wrote to memory of 2320 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 32 PID 2120 wrote to memory of 2320 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 32 PID 2120 wrote to memory of 2320 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 32 PID 2120 wrote to memory of 2320 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 32 PID 2120 wrote to memory of 2320 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 32 PID 2120 wrote to memory of 2320 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 32 PID 2120 wrote to memory of 2320 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 32 PID 2120 wrote to memory of 2320 2120 bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1188
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1300
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf3b291889020a85dd1a03a61ba02b51_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Roaming\Exunb\awqyaz.exe"C:\Users\Admin\AppData\Roaming\Exunb\awqyaz.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2376
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpe5345588.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2320
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5785dd4f9cf5d452bb01fcd2002228917
SHA1d07390d0c1469c664a5f6f019c96f9c319288610
SHA256416797a788fdae3f3f80cb6280740c322946acf17e497b8237a83dbb6e8b8460
SHA512772f355f366d5d9b1e5402a05d7ef7b06c0a3c1be7b39b4fbeca33a9610acc61050f83cd1cd586dc9b6d3f34d760409decfd6ce12fcd055af8992298cc3e3462
-
Filesize
321KB
MD505837834b63267404ee9aa7febb4a476
SHA15632dda30ba4880ee8597ba299fa46320b234761
SHA25650b74a9de80ec8ccf8340f8a3820580780529357777822dea9708e122d1e909f
SHA512b032ae5b517760d9c2bb6c8e6287047043eacde98fe08ad863deeb97b49c1dab34dd1c92fe232b7617a4a97124c921a114cd678f85118243cedbb92c62d7b09f