Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 02:15

General

  • Target

    d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe

  • Size

    170KB

  • MD5

    d57f9da6f6579f72d45f5003119b76d8

  • SHA1

    842711072af819ed5f69727d211ee97ab93f0c3a

  • SHA256

    c2d5639b198e0f3c35c6d4ead201ac28fb69a0134d793f8a351a7684dbbb74e8

  • SHA512

    abe597d041c344fe28bdd8642372a81a9001250681824c60ccae69771e825ced5ef0c4c3c27b7461a9b337e773bba838947587a39b6889e4a637434f2b037831

  • SSDEEP

    3072:DOp8KRaug8q9/ZXoOIeBBMLE0Y11rP3jHkvpoGoFjT7rEzmZ/B9Ww2CUQGO/bF0P:iCKRaczLE0oHkvpoGoqzY3zF0rth

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1116
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1172
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1200
          • C:\Users\Admin\AppData\Local\Temp\d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\d57f9da6f6579f72d45f5003119b76d8_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1700
            • C:\Users\Admin\AppData\Roaming\Ynbux\yqyw.exe
              "C:\Users\Admin\AppData\Roaming\Ynbux\yqyw.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1724
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp58bbbc5e.bat"
              3⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:3048
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:896
          • C:\Program Files\Windows Mail\WinMail.exe
            "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
            1⤵
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:2352
          • C:\Program Files\Windows Mail\WinMail.exe
            "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
            1⤵
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:900
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1932

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E6024EAC88E6B6165D49FE3C95ADD735

                    Filesize

                    558B

                    MD5

                    3cc0012f96f8f44164c18d7de05023d9

                    SHA1

                    c8feb560d751fe720c8bdb53f5e78aa92abb9a9e

                    SHA256

                    2654c273c211ae1afc60a7736153a853142e3db028417206948576d1d57bf5d5

                    SHA512

                    626746176663e2460b18f1eb245306107060c172c4e65ad710dd75ec0b348d8f000342c0dd2f7ea3bb2e0796f61e1ddd2cd77c312d6a177ff2e70a10b68cc6af

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735

                    Filesize

                    232B

                    MD5

                    f270c5d55234d79d965b39fb3d68a8ff

                    SHA1

                    cd7fd7ab95c76ee127cb2c488e600d81899bb4ec

                    SHA256

                    8d0f012479618401329c9d74020121b7693d69cfe5945d9ad41e6b8d928e545d

                    SHA512

                    004c5c1b949d2608071c9a46ad4857eee70ae778a67b6926c267a83df072e7cd59559f218f58ef099641f253713fb1e02a3edea861230ecb5de45bfdab0c931d

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStore

                    Filesize

                    2.0MB

                    MD5

                    8e4681a5be7365aa3589579e56962bc9

                    SHA1

                    f99b80359608c914e72abe3087cf2a9bb86fab9e

                    SHA256

                    6382c156cf9c48cd34b3f6853ef32c300958945d0a9732e0904963d21e951a8e

                    SHA512

                    18979054c3f20064b771d99f366e8407c862498d228739197d4537e2cd774d07a00113ab92d3d4d477deccbcf3c7e8f5924863710143fcb9a05d64702bea3b7a

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.chk

                    Filesize

                    8KB

                    MD5

                    74e6b0ab1a86236dd87e4106607325eb

                    SHA1

                    603dce6ce49f05a7c629e4ca9508645927a9eea6

                    SHA256

                    9c11389ad7717b35e5961691ff3209da951102aba762cefdf50f2b4a4821a0b5

                    SHA512

                    f5dafe1daa5006696a9c8412de70d61e94948d920239b4628d3bb64908adb60b767671e582f8d5fdbe72796ec26bdb7f80dd3fac15b89a2b251a5b3a61350ecd

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                    Filesize

                    2.0MB

                    MD5

                    e0fcd7e76d494a23000b32c994af0467

                    SHA1

                    0e1a8744b44c2a8d78c96e0d4a40bd97a3268d9c

                    SHA256

                    ca4ad806ffff707623fdc3d4a977bdd56d91bc486e7ac381f600d2e32bd04f6c

                    SHA512

                    94d1e434b067eaca9b63f0b6d2628e79d4edade818d046f61a79b71e9ec08e69a7a1ef8b384f923e80f18a4926a9fff6e1b72af73ef704b22de058a343bbacc8

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                    Filesize

                    2.0MB

                    MD5

                    a9284f8993f4bfb30e2ead1deb621744

                    SHA1

                    c7e85657a2e9461df9befeaa46224a578b63e3ea

                    SHA256

                    e05661f7c98b7bb55127b30d8b93a0ff89617c28864640db4c62681dcc60f7c3

                    SHA512

                    6aafa1315b9b405b97e9d4fc9dc1779b4fd0c58b1fce2b98d537573976aee7ae83e2c914105bdf8fe834b5d67f76b23ad6079613c7d7854f1aeea40d33e91422

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                    Filesize

                    2.0MB

                    MD5

                    3e185a9a2cd4fd8fd2d2be276a9d5969

                    SHA1

                    c56260eb2aaed7aee768a7a189edcc66d4cf9040

                    SHA256

                    1c09553c3a74ed33b6d361674558074134302cafa9591933a788fbd4d637f903

                    SHA512

                    8f3374b0136a571926bb16481e3f5e31f76fb2782555882247cba3708f34c5ab23f21ac123dde63a12e2005fe7a1cc952921cf80b49c971d0d59603360490bba

                  • C:\Users\Admin\AppData\Local\Temp\CabCA03.tmp

                    Filesize

                    70KB

                    MD5

                    49aebf8cbd62d92ac215b2923fb1b9f5

                    SHA1

                    1723be06719828dda65ad804298d0431f6aff976

                    SHA256

                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                    SHA512

                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                  • C:\Users\Admin\AppData\Local\Temp\tmp58bbbc5e.bat

                    Filesize

                    271B

                    MD5

                    a2b5a4e9006adcda1fafaa715cd105dd

                    SHA1

                    0b7ddd1f6fe95f1f16db4ae7cfb3e05a802afcd7

                    SHA256

                    90116a372ce846d30f155be51fe6e6d906759ec1a5651d241ffa6d5a070e6e80

                    SHA512

                    a7f490ed647eca942ac8be2efe6460db5f8873b0de57dfd6863b41592edd3077dd4155b345badfa1a358e206339676e0ad50825ec41d5115dfe235e787f8910c

                  • C:\Users\Admin\AppData\Roaming\Aqboci\epuz.wyd

                    Filesize

                    380B

                    MD5

                    9b5436796fef4dfcbab233e6248e0142

                    SHA1

                    7cd2b901d38d33fb03f04009a2d557c867a479d2

                    SHA256

                    9526cd07fc32051c0c55eb2d44646e5eaf934c63121277ea0d43e549268626f2

                    SHA512

                    ee7277a507fdd44322cab6e3c505c73ead45cc302c7302fbd47780d6e8af9fa10d6a3f112e276cac57e9e72c2a42fc800fd7f8d87b015f4e4c0d73ff2170ea6c

                  • C:\Users\Admin\AppData\Roaming\Ynbux\yqyw.exe

                    Filesize

                    170KB

                    MD5

                    464a0425c86c966de4b120ab98e8a1c9

                    SHA1

                    f269228501aebbe8cb442ad5314e24cbc8ec2ad4

                    SHA256

                    12f16b953b1a4a1e900c350bd2d440ef0e80827c51a010a81a1e6bcc6f0634ad

                    SHA512

                    15f121188e5c652c5218ac5c49e807fd01c451e536ce433d0f7bda1832f2a119fea246b051e5cac21943866e44ce66b21c73e630825c8917cdb913f91a14221d

                  • C:\debug.txt

                    Filesize

                    2KB

                    MD5

                    4eb16308cc053c67425606a266a079ab

                    SHA1

                    d06013c92f90f5c61a4537ff19753537fd713623

                    SHA256

                    bf59277c3ce17a24e4561d11a3411a2b8f9a1dafc4824ed05ffd57d7139ed1c8

                    SHA512

                    949232a619080646cd2dae9cc7b3dd26d164770cebf17e01e1ed7a9c92f8d8791bb82edb0ab4eccc39f99674d239c7457a3bb2d42db80370e312d938ca23fe38

                  • C:\debug.txt

                    Filesize

                    2KB

                    MD5

                    8c4734136b9afe92b2b53f330322b83b

                    SHA1

                    7bbed3929a51537258c8270b3bee079b6a1f8ff6

                    SHA256

                    a5e94c3ba5ee06a3f7adc9fb305f35d952c580d12dae9dd21a9642b707d1fbb3

                    SHA512

                    d7d24fe0f289f91f3443f97da0225c43cab61968054abc5e8df22eaf181d3771db08e95f18c2092a44cffd64da089f473fad016856c92a5b127d8bffb893a30a

                  • C:\debug.txt

                    Filesize

                    11KB

                    MD5

                    8611bf016f4954a450117292758a0e3a

                    SHA1

                    77f78c6a89ff1208d66b3aab67bb943626f0d564

                    SHA256

                    0b458b4459d30dc06b4e0e10df7599eb82c3bf321979870cbf8c5540ef564aab

                    SHA512

                    63fb225d40be2c75a463da642d7ccb32999a5a02f60385a73cc7e0e34414aa453c92c52b84e81384d26aeb771f5f86593850bc7a2fb15fea3d2245b5b53ce0f6

                  • C:\debug.txt

                    Filesize

                    12KB

                    MD5

                    5dafab0a81f84a80b8273d8413e68d9d

                    SHA1

                    bb61b53bdb787cb2a399cc566f756525a60f5c33

                    SHA256

                    8949254e3b1a7e75a18653418d1865cc26c2f109d4119d67f9be6a117fac5d8b

                    SHA512

                    65ac460f6414101b764e8bc6bc365f54675a478e293ec680c01780f98d7efae3198588ffbd8e8ec3d12a83373976333ed6744204c21ad9dffbb6b54b6468b988

                  • C:\debug.txt

                    Filesize

                    13KB

                    MD5

                    fef67032323aef1de69c6239598e3aa4

                    SHA1

                    d47f0846afd17eec4511a65543bafb135f144286

                    SHA256

                    b2cc1421a765c91060933650c4f3365ada250450a706c64a56e7e1279899ace5

                    SHA512

                    f45541894a954b92ff0a0ccba747beb3af06316bd04d13b01f7a1a1641436737fa3264a82f9f5a26826c57b03485ed76ba821f39052917692942a4e3b71f7544

                  • C:\debug.txt

                    Filesize

                    15KB

                    MD5

                    37a05583fea368da1eba16b855c0ed38

                    SHA1

                    6c330f3e71373f9767190d99abdb5448a8d7c5c0

                    SHA256

                    f7427c5b37633ee271379c59a986db253bc2b2e685d83f9c68e9b228359e3b2c

                    SHA512

                    f472a83a1a3ebfedf092c1fd0e8093eb8826fb8f786423db01f9b00d1af8c41e9e72fd05d69fa82f51fd4a7c56520955ba910f5d510184cda5f144ad72d87ba8

                  • C:\debug.txt

                    Filesize

                    1KB

                    MD5

                    137d4492cbd273257559530d1330a7ea

                    SHA1

                    85ffaf8418df122bc5df70e65c5c5db7a29be373

                    SHA256

                    10d3ab37c96e6829aa89b45a90bfa4c29860b964c9ec059183ae70e2ad712912

                    SHA512

                    5616ee04a3f3ed95f6f700f74312de16d59300d27ffe4a4580dacbae9cb3e4f43fc13172f7ad988ac833bfd91da2a2d9c09a3e75f03beeec94ec366788b12da0

                  • C:\debug.txt

                    Filesize

                    21KB

                    MD5

                    8cfb8eb4e02a75e9c8bffbf7fc290973

                    SHA1

                    fba7057a5a8cd49f2b4b13e575d77e07e00bc726

                    SHA256

                    0bf3ff3fcceb9047e7851db9571bf6ea2b5313fe3f9b7c56fc543357a67f811e

                    SHA512

                    79e782991b7a075e294a57dddfb8b3ecf13ec9484cda75528b160138567a68e90a75a173fdebbb6f58fd9eb1a39bcf30131782d573326e88c490f87d9e015b68

                  • C:\debug.txt

                    Filesize

                    7KB

                    MD5

                    cc57067a149505f8e126c437f9eb2b51

                    SHA1

                    cffa4c6993e28770a883792f3a35d90c9defbf86

                    SHA256

                    8fdb9a544418f3af6a12652b68ca8d1999c4f9a0a47d704e1d62ebdd6b52c987

                    SHA512

                    5b3da134f7337c074b9dc63ce0b1cc2dd5de9bad94ea5a0cf05b544d7e6562c4d444f080504d3a4d975b034565be4ef21eced4cfa56921bd6600867196ca1364

                  • memory/896-73-0x0000000001F30000-0x0000000001F5F000-memory.dmp

                    Filesize

                    188KB

                  • memory/896-74-0x0000000001F30000-0x0000000001F5F000-memory.dmp

                    Filesize

                    188KB

                  • memory/896-75-0x0000000001F30000-0x0000000001F5F000-memory.dmp

                    Filesize

                    188KB

                  • memory/896-76-0x0000000001F30000-0x0000000001F5F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1116-39-0x00000000001F0000-0x000000000021F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1116-43-0x00000000001F0000-0x000000000021F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1116-41-0x00000000001F0000-0x000000000021F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1116-42-0x00000000001F0000-0x000000000021F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1116-44-0x00000000001F0000-0x000000000021F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1172-57-0x00000000001B0000-0x00000000001DF000-memory.dmp

                    Filesize

                    188KB

                  • memory/1172-55-0x00000000001B0000-0x00000000001DF000-memory.dmp

                    Filesize

                    188KB

                  • memory/1172-51-0x00000000001B0000-0x00000000001DF000-memory.dmp

                    Filesize

                    188KB

                  • memory/1172-53-0x00000000001B0000-0x00000000001DF000-memory.dmp

                    Filesize

                    188KB

                  • memory/1200-66-0x0000000002F00000-0x0000000002F2F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1200-67-0x0000000002F00000-0x0000000002F2F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1200-65-0x0000000002F00000-0x0000000002F2F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1200-64-0x0000000002F00000-0x0000000002F2F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1700-105-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-109-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-99-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-97-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-95-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-82-0x00000000002F0000-0x000000000031F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1700-83-0x00000000002F0000-0x000000000031F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1700-84-0x00000000002F0000-0x000000000031F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1700-103-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-93-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-107-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-85-0x00000000002F0000-0x000000000031F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1700-111-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-115-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-117-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-119-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-121-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-123-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-186-0x00000000002F0000-0x000000000031F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1700-187-0x0000000077710000-0x0000000077711000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-188-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-113-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-101-0x0000000000320000-0x0000000000321000-memory.dmp

                    Filesize

                    4KB

                  • memory/1700-86-0x00000000002F0000-0x000000000031F000-memory.dmp

                    Filesize

                    188KB