Analysis
-
max time kernel
95s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 03:39
Behavioral task
behavioral1
Sample
d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe
-
Size
844KB
-
MD5
d598b51deee3cc65a5ddfa013fcdb331
-
SHA1
95bfdd6d3b6fdafba3be338281fdbe497d842b3d
-
SHA256
27e1af700bea50c00e4f8a88b19954988ac750ac60459c926f2c172ba53be058
-
SHA512
ea7ff6d7231b1810e32bc56cf4f95bea301489ebd5694770230ad75f8efd6abf29a402c4c973d8f93e7f0d55f3ec90b46cdcf4ae939b2ac871727f19dcb36db3
-
SSDEEP
12288:ZOfrXfF02kdop3Nk1H27RFvwWl4/Suc/qR:ZOTXfF02kSp+H2DwWlj
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{3G4L2686-J4L1-X5MV-12RE-JFH5V38F5030} d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3G4L2686-J4L1-X5MV-12RE-JFH5V38F5030}\StubPath = "C:\\Program Files (x86)\\R4y_Dz00\\Coffin Of Evil.exe Restart" d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2364-0-0x0000000000400000-0x00000000004D3000-memory.dmp aspack_v212_v242 behavioral2/memory/2364-9-0x0000000000400000-0x00000000004D3000-memory.dmp aspack_v212_v242 -
resource yara_rule behavioral2/memory/2436-10-0x0000000010410000-0x0000000010443000-memory.dmp upx behavioral2/memory/2436-14-0x0000000002290000-0x00000000022C3000-memory.dmp upx behavioral2/memory/2436-18-0x0000000002290000-0x00000000022C3000-memory.dmp upx behavioral2/memory/2436-15-0x0000000002290000-0x00000000022C3000-memory.dmp upx behavioral2/memory/2436-24-0x0000000002290000-0x00000000022C3000-memory.dmp upx behavioral2/memory/2436-29-0x0000000002290000-0x00000000022C3000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xdocx = "C:\\Program Files (x86)\\R4y_Dz00\\Coffin Of Evil.exe" d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xcrx = "C:\\Program Files (x86)\\R4y_Dz00\\Coffin Of Evil.exe" d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2364 set thread context of 2436 2364 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 83 -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\R4y_Dz00\Coffin Of Evil.exe d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe File created C:\Program Files (x86)\R4y_Dz00\logs.dat d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\R4y_Dz00\logs.dat d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\R4y_Dz00\plugin.dat d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe File created C:\Program Files (x86)\R4y_Dz00\Coffin Of Evil.exe d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2464 2436 WerFault.exe 83 3352 2436 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Token: SeDebugPrivilege 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Token: SeDebugPrivilege 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Token: SeDebugPrivilege 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Token: SeDebugPrivilege 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe Token: SeDebugPrivilege 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2364 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2436 2364 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 83 PID 2364 wrote to memory of 2436 2364 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 83 PID 2364 wrote to memory of 2436 2364 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 83 PID 2364 wrote to memory of 2436 2364 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 83 PID 2364 wrote to memory of 2436 2364 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 83 PID 2364 wrote to memory of 2436 2364 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 83 PID 2364 wrote to memory of 2436 2364 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 83 PID 2364 wrote to memory of 2436 2364 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 83 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87 PID 2436 wrote to memory of 940 2436 d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d598b51deee3cc65a5ddfa013fcdb331_JaffaCakes118.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 6163⤵
- Program crash
PID:2464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 6243⤵
- Program crash
PID:3352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2436 -ip 24361⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2436 -ip 24361⤵PID:2480