Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 18:53
Behavioral task
behavioral1
Sample
c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe
-
Size
236KB
-
MD5
c96bed6bd7f5d8cc4e6c144771c46398
-
SHA1
aa85cc2cfe327e02c6f8fd90029c77081b0c67bb
-
SHA256
eeacc1258a40e39645f24018293e3371bf77cdb262763b27057a3ac5beff18cd
-
SHA512
1ab061c6cabed0b4655bd68e09dafa076a3dd8b0cd40f9593864db7547881ce0eaccb7f4caceacb4b69d64d11645d964c92b63a220a1f1da4b3e1b2f754835e5
-
SSDEEP
6144:ANUvUU3w6u0OSiiDjnoFCcfjXEEEAcONJ+iGnaC/g4TcG9z:A6sQwGXVjMlNUiGJ/g+cgz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3036 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2828 omde.exe 1896 omde.exe -
Loads dropped DLL 2 IoCs
pid Process 1632 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 1632 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2232-1-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/2232-16-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/files/0x0033000000019616-24.dat upx behavioral1/memory/2828-33-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/2828-51-0x0000000000400000-0x0000000000459000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7D4B5FC8-1892-AD4F-C2C5-7543D4B4565E} = "C:\\Users\\Admin\\AppData\\Roaming\\Ettoha\\omde.exe" omde.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2232 set thread context of 1632 2232 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 30 PID 2828 set thread context of 1896 2828 omde.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omde.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe 1896 omde.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1632 2232 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 30 PID 2232 wrote to memory of 1632 2232 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 30 PID 2232 wrote to memory of 1632 2232 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 30 PID 2232 wrote to memory of 1632 2232 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 30 PID 2232 wrote to memory of 1632 2232 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 30 PID 2232 wrote to memory of 1632 2232 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 30 PID 2232 wrote to memory of 1632 2232 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 30 PID 2232 wrote to memory of 1632 2232 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 30 PID 2232 wrote to memory of 1632 2232 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 30 PID 1632 wrote to memory of 2828 1632 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 31 PID 1632 wrote to memory of 2828 1632 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 31 PID 1632 wrote to memory of 2828 1632 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 31 PID 1632 wrote to memory of 2828 1632 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 31 PID 2828 wrote to memory of 1896 2828 omde.exe 32 PID 2828 wrote to memory of 1896 2828 omde.exe 32 PID 2828 wrote to memory of 1896 2828 omde.exe 32 PID 2828 wrote to memory of 1896 2828 omde.exe 32 PID 2828 wrote to memory of 1896 2828 omde.exe 32 PID 2828 wrote to memory of 1896 2828 omde.exe 32 PID 2828 wrote to memory of 1896 2828 omde.exe 32 PID 2828 wrote to memory of 1896 2828 omde.exe 32 PID 2828 wrote to memory of 1896 2828 omde.exe 32 PID 1632 wrote to memory of 3036 1632 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 33 PID 1632 wrote to memory of 3036 1632 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 33 PID 1632 wrote to memory of 3036 1632 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 33 PID 1632 wrote to memory of 3036 1632 c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe 33 PID 1896 wrote to memory of 1196 1896 omde.exe 19 PID 1896 wrote to memory of 1196 1896 omde.exe 19 PID 1896 wrote to memory of 1196 1896 omde.exe 19 PID 1896 wrote to memory of 1196 1896 omde.exe 19 PID 1896 wrote to memory of 1196 1896 omde.exe 19 PID 1896 wrote to memory of 1276 1896 omde.exe 20 PID 1896 wrote to memory of 1276 1896 omde.exe 20 PID 1896 wrote to memory of 1276 1896 omde.exe 20 PID 1896 wrote to memory of 1276 1896 omde.exe 20 PID 1896 wrote to memory of 1276 1896 omde.exe 20 PID 1896 wrote to memory of 1344 1896 omde.exe 21 PID 1896 wrote to memory of 1344 1896 omde.exe 21 PID 1896 wrote to memory of 1344 1896 omde.exe 21 PID 1896 wrote to memory of 1344 1896 omde.exe 21 PID 1896 wrote to memory of 1344 1896 omde.exe 21 PID 1896 wrote to memory of 2020 1896 omde.exe 23 PID 1896 wrote to memory of 2020 1896 omde.exe 23 PID 1896 wrote to memory of 2020 1896 omde.exe 23 PID 1896 wrote to memory of 2020 1896 omde.exe 23 PID 1896 wrote to memory of 2020 1896 omde.exe 23 PID 1896 wrote to memory of 1632 1896 omde.exe 30 PID 1896 wrote to memory of 1632 1896 omde.exe 30 PID 1896 wrote to memory of 1632 1896 omde.exe 30 PID 1896 wrote to memory of 1632 1896 omde.exe 30 PID 1896 wrote to memory of 1632 1896 omde.exe 30 PID 1896 wrote to memory of 3036 1896 omde.exe 33 PID 1896 wrote to memory of 3036 1896 omde.exe 33 PID 1896 wrote to memory of 3036 1896 omde.exe 33 PID 1896 wrote to memory of 3036 1896 omde.exe 33 PID 1896 wrote to memory of 3036 1896 omde.exe 33
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1196
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1276
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Roaming\Ettoha\omde.exe"C:\Users\Admin\AppData\Roaming\Ettoha\omde.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\Ettoha\omde.exeC:\Users\Admin\AppData\Roaming\Ettoha\omde.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1896
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp09833665.bat"4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5e7b50499b0ec59dcfeebe8f884588839
SHA16bdf2a1d474bbace5f6dc1f4fce5445d64c54a62
SHA25692e5469e8c4bdd9f05b25fb4b4084e0b4b7c5e65ea06e42f3029dc04e4334022
SHA51290e79ecd75742e5c9c27518835bf417049f383f04eb6d97a985d98002357ae0183b6371e0da14207ca4ec920d81bc2af2d4427aff84b3b0cf170564bf80ba52b
-
Filesize
236KB
MD5735954d54af147c5e548c69d5cea39e4
SHA1618967d74e49984686de53eb049338d39dd417c3
SHA2569e2277d6eb13e5622b7bae4ebd650e11c6925d6e847654418f4d46b2bfc1c8ba
SHA5126f2e8868edd56140903e987df61f429e0e16630ecd8246f8aaf5654e2203299ab56517d2dd68aaa9a17c50f75b50e56b6f8708406e111688e2f215e076347aa3