Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 04:06
Static task
static1
Behavioral task
behavioral1
Sample
d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe
-
Size
99KB
-
MD5
d5a0f6baebe6f4bf5658d38c18d34ec8
-
SHA1
6bcbb00faec744ff0a4d6d141071eef2baa70769
-
SHA256
17f96397035fded780c11562876cd455b635d98255f2052912afcd113c1a55d6
-
SHA512
e5342e1acb9967ec02cb935e413c91726c4005f217120112d5ccc56e11a82a3805673a4c13fff6e1ce808e84ea83e294d89590f02feb04f388f8cff2755aefcc
-
SSDEEP
1536:lidHJUw2UZ2RbwbU6Pn1SNHe4HVpHe6B2V8oLMb1Zb4aaGw:loCGUe1SNHe4HVp+rVpLW4pGw
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2112 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
eoukqpr.exeeoukqpr.exepid Process 2296 eoukqpr.exe 2240 eoukqpr.exe -
Loads dropped DLL 2 IoCs
Processes:
d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exeeoukqpr.exepid Process 536 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 2296 eoukqpr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\eoukqpr.exe\" /r" d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exeeoukqpr.exeeoukqpr.exedescription pid Process procid_target PID 1924 set thread context of 536 1924 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 30 PID 2296 set thread context of 2240 2296 eoukqpr.exe 32 PID 2240 set thread context of 2260 2240 eoukqpr.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
eoukqpr.exeeoukqpr.execmd.exesvchost.exed5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exed5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eoukqpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eoukqpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exed5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exeeoukqpr.exeeoukqpr.exedescription pid Process procid_target PID 1924 wrote to memory of 536 1924 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 30 PID 1924 wrote to memory of 536 1924 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 30 PID 1924 wrote to memory of 536 1924 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 30 PID 1924 wrote to memory of 536 1924 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 30 PID 1924 wrote to memory of 536 1924 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 30 PID 1924 wrote to memory of 536 1924 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 30 PID 1924 wrote to memory of 536 1924 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 30 PID 1924 wrote to memory of 536 1924 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 30 PID 1924 wrote to memory of 536 1924 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 30 PID 536 wrote to memory of 2296 536 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 31 PID 536 wrote to memory of 2296 536 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 31 PID 536 wrote to memory of 2296 536 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 31 PID 536 wrote to memory of 2296 536 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 31 PID 2296 wrote to memory of 2240 2296 eoukqpr.exe 32 PID 2296 wrote to memory of 2240 2296 eoukqpr.exe 32 PID 2296 wrote to memory of 2240 2296 eoukqpr.exe 32 PID 2296 wrote to memory of 2240 2296 eoukqpr.exe 32 PID 2296 wrote to memory of 2240 2296 eoukqpr.exe 32 PID 2296 wrote to memory of 2240 2296 eoukqpr.exe 32 PID 2296 wrote to memory of 2240 2296 eoukqpr.exe 32 PID 2296 wrote to memory of 2240 2296 eoukqpr.exe 32 PID 2296 wrote to memory of 2240 2296 eoukqpr.exe 32 PID 2240 wrote to memory of 2260 2240 eoukqpr.exe 33 PID 2240 wrote to memory of 2260 2240 eoukqpr.exe 33 PID 2240 wrote to memory of 2260 2240 eoukqpr.exe 33 PID 2240 wrote to memory of 2260 2240 eoukqpr.exe 33 PID 2240 wrote to memory of 2260 2240 eoukqpr.exe 33 PID 2240 wrote to memory of 2260 2240 eoukqpr.exe 33 PID 536 wrote to memory of 2112 536 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 34 PID 536 wrote to memory of 2112 536 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 34 PID 536 wrote to memory of 2112 536 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 34 PID 536 wrote to memory of 2112 536 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\eoukqpr.exe"C:\Users\Admin\eoukqpr.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\eoukqpr.exe"C:\Users\Admin\eoukqpr.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2260
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1737.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD5202ac4c7947f715582270980a27fde7c
SHA1012e7f66cda2b93ff12e0e67a4d782c1017fe823
SHA25606f02b6d9b97cf3eb0e2064f75767f1a82a02b9e2db9aff39c9b442794e81aeb
SHA5129ec7f1f200e85c2749734be25e9ba95b5021ba997e683fe77558a48c54414c3cd62cf8bde4007e02d8f732eb884c860c825054165fd65a9a0e61f0b482632a73
-
Filesize
99KB
MD5d5a0f6baebe6f4bf5658d38c18d34ec8
SHA16bcbb00faec744ff0a4d6d141071eef2baa70769
SHA25617f96397035fded780c11562876cd455b635d98255f2052912afcd113c1a55d6
SHA512e5342e1acb9967ec02cb935e413c91726c4005f217120112d5ccc56e11a82a3805673a4c13fff6e1ce808e84ea83e294d89590f02feb04f388f8cff2755aefcc