Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe
-
Size
327KB
-
MD5
d320d1f7f7c9e975083a3f7a9ea15ab5
-
SHA1
b09321b68b77e667a337a39e78519767470cf1ca
-
SHA256
b99201c0cea2537f05b5c8e61f8aaabc3827e3166ad9133ec9d7ab986a916b58
-
SHA512
29505f4d9ea170999788485f79f8ab427b01f2214bf4cc76052fa93bd6c478d23590f07c1b71243077df585edfa9b3f668bc4112abd2b4bb0005696719cc4b7b
-
SSDEEP
6144:v64FaDFLjydzoKSgt4n7mptOO4TyUo+C5Nqqsoeb:v6FDkdoKS647mCTZBOqZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2868 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2896 joos.exe 3064 joos.exe -
Loads dropped DLL 2 IoCs
pid Process 2748 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 2748 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\{ED60B7C8-3C80-AD4F-2955-D827011AFB3A} = "C:\\Users\\Admin\\AppData\\Roaming\\Duehi\\joos.exe" joos.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1848 set thread context of 2748 1848 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 30 PID 2896 set thread context of 3064 2896 joos.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language joos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe 3064 joos.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2748 1848 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2748 1848 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2748 1848 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2748 1848 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2748 1848 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2748 1848 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2748 1848 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2748 1848 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2748 1848 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2896 2748 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2896 2748 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2896 2748 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2896 2748 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 31 PID 2896 wrote to memory of 3064 2896 joos.exe 32 PID 2896 wrote to memory of 3064 2896 joos.exe 32 PID 2896 wrote to memory of 3064 2896 joos.exe 32 PID 2896 wrote to memory of 3064 2896 joos.exe 32 PID 2896 wrote to memory of 3064 2896 joos.exe 32 PID 2896 wrote to memory of 3064 2896 joos.exe 32 PID 2896 wrote to memory of 3064 2896 joos.exe 32 PID 2896 wrote to memory of 3064 2896 joos.exe 32 PID 2896 wrote to memory of 3064 2896 joos.exe 32 PID 2748 wrote to memory of 2868 2748 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 33 PID 2748 wrote to memory of 2868 2748 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 33 PID 2748 wrote to memory of 2868 2748 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 33 PID 2748 wrote to memory of 2868 2748 d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe 33 PID 3064 wrote to memory of 1104 3064 joos.exe 19 PID 3064 wrote to memory of 1104 3064 joos.exe 19 PID 3064 wrote to memory of 1104 3064 joos.exe 19 PID 3064 wrote to memory of 1104 3064 joos.exe 19 PID 3064 wrote to memory of 1104 3064 joos.exe 19 PID 3064 wrote to memory of 1168 3064 joos.exe 20 PID 3064 wrote to memory of 1168 3064 joos.exe 20 PID 3064 wrote to memory of 1168 3064 joos.exe 20 PID 3064 wrote to memory of 1168 3064 joos.exe 20 PID 3064 wrote to memory of 1168 3064 joos.exe 20 PID 3064 wrote to memory of 1212 3064 joos.exe 21 PID 3064 wrote to memory of 1212 3064 joos.exe 21 PID 3064 wrote to memory of 1212 3064 joos.exe 21 PID 3064 wrote to memory of 1212 3064 joos.exe 21 PID 3064 wrote to memory of 1212 3064 joos.exe 21 PID 3064 wrote to memory of 856 3064 joos.exe 23 PID 3064 wrote to memory of 856 3064 joos.exe 23 PID 3064 wrote to memory of 856 3064 joos.exe 23 PID 3064 wrote to memory of 856 3064 joos.exe 23 PID 3064 wrote to memory of 856 3064 joos.exe 23 PID 3064 wrote to memory of 2868 3064 joos.exe 33 PID 3064 wrote to memory of 2868 3064 joos.exe 33 PID 3064 wrote to memory of 2868 3064 joos.exe 33 PID 3064 wrote to memory of 2868 3064 joos.exe 33 PID 3064 wrote to memory of 2868 3064 joos.exe 33
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d320d1f7f7c9e975083a3f7a9ea15ab5_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Roaming\Duehi\joos.exe"C:\Users\Admin\AppData\Roaming\Duehi\joos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Roaming\Duehi\joos.exe"C:\Users\Admin\AppData\Roaming\Duehi\joos.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd876aaa5.bat"4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2868
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5280adf5528d8eaeb2ddcbeef1f92ce3f
SHA1e904414e4f5f025b95b2c0a320c131be73149522
SHA2569c8fcf5586f38422e275ff321fd292f832c1b77624dfb6bec846feac084a7d7e
SHA5125ee480cfc5d003add7b51c86251a3b00c69822b01e96fe61107fd70354282f87f90797458bbdf3cee6f952ff813930eb964de1a423c10f85b3b441984de27b2e
-
Filesize
327KB
MD572db930e6e2d0e3e902232f2fe66412e
SHA12e26db037267cb7aadaa93fbe5ebcc66e4a19b24
SHA256e81b31dd95db439c8f9418597e4f966a2569fee38e646a9f91819efb8d7a2725
SHA5125a109bd3834be28ea64fcc36cffee449503eb18ea27614e1c10a24cb6af49c1933212cd69fe7bc8d6ba29e01bbcfa3d3ef6651678824a9122f215f9140014403