Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 03:39
Behavioral task
behavioral1
Sample
d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe
-
Size
844KB
-
MD5
d598b51deee3cc65a5ddfa013fcdb331
-
SHA1
95bfdd6d3b6fdafba3be338281fdbe497d842b3d
-
SHA256
27e1af700bea50c00e4f8a88b19954988ac750ac60459c926f2c172ba53be058
-
SHA512
ea7ff6d7231b1810e32bc56cf4f95bea301489ebd5694770230ad75f8efd6abf29a402c4c973d8f93e7f0d55f3ec90b46cdcf4ae939b2ac871727f19dcb36db3
-
SSDEEP
12288:ZOfrXfF02kdop3Nk1H27RFvwWl4/Suc/qR:ZOTXfF02kSp+H2DwWlj
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3G4L2686-J4L1-X5MV-12RE-JFH5V38F5030}\StubPath = "C:\\Program Files (x86)\\R4y_Dz00\\Coffin Of Evil.exe Restart" d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{3G4L2686-J4L1-X5MV-12RE-JFH5V38F5030} d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2388-0-0x0000000000400000-0x00000000004D3000-memory.dmp aspack_v212_v242 behavioral1/memory/2388-17-0x0000000000400000-0x00000000004D3000-memory.dmp aspack_v212_v242 behavioral1/memory/2388-44-0x00000000026A0000-0x0000000002773000-memory.dmp aspack_v212_v242 -
resource yara_rule behavioral1/memory/2500-24-0x0000000010410000-0x0000000010443000-memory.dmp upx behavioral1/memory/2500-27-0x0000000000310000-0x0000000000343000-memory.dmp upx behavioral1/memory/2500-31-0x0000000000310000-0x0000000000343000-memory.dmp upx behavioral1/memory/2500-28-0x0000000000310000-0x0000000000343000-memory.dmp upx behavioral1/memory/2500-37-0x0000000000310000-0x0000000000343000-memory.dmp upx behavioral1/memory/2500-42-0x0000000000310000-0x0000000000343000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\xcrx = "C:\\Program Files (x86)\\R4y_Dz00\\Coffin Of Evil.exe" d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xdocx = "C:\\Program Files (x86)\\R4y_Dz00\\Coffin Of Evil.exe" d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2388 set thread context of 2500 2388 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 30 -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\R4y_Dz00\Coffin Of Evil.exe d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\R4y_Dz00\Coffin Of Evil.exe d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe File created C:\Program Files (x86)\R4y_Dz00\logs.dat d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\R4y_Dz00\logs.dat d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\R4y_Dz00\plugin.dat d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Token: SeDebugPrivilege 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Token: SeDebugPrivilege 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Token: SeDebugPrivilege 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Token: SeDebugPrivilege 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Token: SeDebugPrivilege 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2388 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2500 2388 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2500 2388 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2500 2388 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2500 2388 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2500 2388 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2500 2388 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2500 2388 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2500 2388 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2500 2388 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2144 2500 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2144
-
-