Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 15:32
Behavioral task
behavioral1
Sample
c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe
-
Size
78KB
-
MD5
c10ae968fbd562db6384efc6f87da6d6
-
SHA1
7c48cdb4a1430a7d409ceb558cbe24f41eeb4d9f
-
SHA256
8071c85be5b5562159540c70f7b0f6ffa0e6cd183ea9b56a41aa5cd66c9296fc
-
SHA512
561cda03eca2bf62cd68823c0f1439010f7b99b96b1da719105ba517f627876190d39304f9a3d7574d5fd804cd2173bdf5ddd76ee2dba91e611c3fff724ca2e8
-
SSDEEP
1536:ClysZrJCrI5OC9C2ycs2P6wVm3xtDrPqL5tUrKLctdu6pPa6mGJtAz:ClysaI5/dycspwVqtDLqNtAOa44aa8z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2732 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1644 Antiwyubu.exe -
Loads dropped DLL 2 IoCs
pid Process 2544 c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe 2544 c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2544-0-0x0000000000400000-0x0000000000423000-memory.dmp vmprotect behavioral1/memory/2544-1-0x0000000000400000-0x0000000000423000-memory.dmp vmprotect behavioral1/files/0x00080000000120fd-11.dat vmprotect behavioral1/memory/1644-12-0x0000000000400000-0x0000000000423000-memory.dmp vmprotect behavioral1/memory/2544-15-0x0000000000400000-0x0000000000423000-memory.dmp vmprotect behavioral1/memory/1644-14-0x0000000000400000-0x0000000000423000-memory.dmp vmprotect -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Antiwyubu.exe c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Antiwyubu.exe c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe File created C:\Windows\SysWOW64\Antiwyubu.exe Antiwyubu.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2544 c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe 1644 Antiwyubu.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Antiwyubu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2544 c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1644 Antiwyubu.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1644 2544 c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe 29 PID 2544 wrote to memory of 1644 2544 c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe 29 PID 2544 wrote to memory of 1644 2544 c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe 29 PID 2544 wrote to memory of 1644 2544 c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe 29 PID 1644 wrote to memory of 2712 1644 Antiwyubu.exe 31 PID 1644 wrote to memory of 2712 1644 Antiwyubu.exe 31 PID 1644 wrote to memory of 2712 1644 Antiwyubu.exe 31 PID 1644 wrote to memory of 2712 1644 Antiwyubu.exe 31 PID 2544 wrote to memory of 2732 2544 c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2732 2544 c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2732 2544 c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2732 2544 c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c10ae968fbd562db6384efc6f87da6d6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\Antiwyubu.exe"C:\Windows\system32\Antiwyubu.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Windows\SysWOW64\ANTIWY~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Users\Admin\AppData\Local\Temp\C10AE9~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5c10ae968fbd562db6384efc6f87da6d6
SHA17c48cdb4a1430a7d409ceb558cbe24f41eeb4d9f
SHA2568071c85be5b5562159540c70f7b0f6ffa0e6cd183ea9b56a41aa5cd66c9296fc
SHA512561cda03eca2bf62cd68823c0f1439010f7b99b96b1da719105ba517f627876190d39304f9a3d7574d5fd804cd2173bdf5ddd76ee2dba91e611c3fff724ca2e8