Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe
-
Size
246KB
-
MD5
d5fb865a6bf74142d6ec60555093cc78
-
SHA1
c05a0367c48ee22cbbd85ea159efcf923602d5ab
-
SHA256
d96e3854f3d6cd7a7a5108cc6f0ce82f414b692ce36c31b94c8fd2f3e188beff
-
SHA512
52bdec9cd7d6d5600991013f8291afe32ba4a3527b736ee1b7c690264f3a55307cde9fa409e1af9e6da9666d1bfd2ce49df6671246ea53bc54b8dda1b701e9db
-
SSDEEP
6144:2/DWunG/aOyqC2yqFstzIDl+a7GyGPMG8ufQ:L0GCPqNEVMjd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2068 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1660 yryv.exe 2888 yryv.exe -
Loads dropped DLL 2 IoCs
pid Process 3060 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 3060 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Aslyeg = "C:\\Users\\Admin\\AppData\\Roaming\\Afamem\\yryv.exe" yryv.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3052 set thread context of 3060 3052 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 30 PID 1660 set thread context of 2888 1660 yryv.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yryv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yryv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe 2888 yryv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 3060 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe Token: SeSecurityPrivilege 3060 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 3060 3052 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 30 PID 3052 wrote to memory of 3060 3052 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 30 PID 3052 wrote to memory of 3060 3052 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 30 PID 3052 wrote to memory of 3060 3052 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 30 PID 3052 wrote to memory of 3060 3052 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 30 PID 3052 wrote to memory of 3060 3052 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 30 PID 3052 wrote to memory of 3060 3052 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 30 PID 3052 wrote to memory of 3060 3052 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 30 PID 3052 wrote to memory of 3060 3052 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 30 PID 3060 wrote to memory of 1660 3060 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 31 PID 3060 wrote to memory of 1660 3060 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 31 PID 3060 wrote to memory of 1660 3060 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 31 PID 3060 wrote to memory of 1660 3060 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 31 PID 1660 wrote to memory of 2888 1660 yryv.exe 32 PID 1660 wrote to memory of 2888 1660 yryv.exe 32 PID 1660 wrote to memory of 2888 1660 yryv.exe 32 PID 1660 wrote to memory of 2888 1660 yryv.exe 32 PID 1660 wrote to memory of 2888 1660 yryv.exe 32 PID 1660 wrote to memory of 2888 1660 yryv.exe 32 PID 1660 wrote to memory of 2888 1660 yryv.exe 32 PID 1660 wrote to memory of 2888 1660 yryv.exe 32 PID 1660 wrote to memory of 2888 1660 yryv.exe 32 PID 3060 wrote to memory of 2068 3060 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 33 PID 3060 wrote to memory of 2068 3060 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 33 PID 3060 wrote to memory of 2068 3060 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 33 PID 3060 wrote to memory of 2068 3060 d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe 33 PID 2888 wrote to memory of 1112 2888 yryv.exe 19 PID 2888 wrote to memory of 1112 2888 yryv.exe 19 PID 2888 wrote to memory of 1112 2888 yryv.exe 19 PID 2888 wrote to memory of 1112 2888 yryv.exe 19 PID 2888 wrote to memory of 1112 2888 yryv.exe 19 PID 2888 wrote to memory of 1156 2888 yryv.exe 20 PID 2888 wrote to memory of 1156 2888 yryv.exe 20 PID 2888 wrote to memory of 1156 2888 yryv.exe 20 PID 2888 wrote to memory of 1156 2888 yryv.exe 20 PID 2888 wrote to memory of 1156 2888 yryv.exe 20 PID 2888 wrote to memory of 1192 2888 yryv.exe 21 PID 2888 wrote to memory of 1192 2888 yryv.exe 21 PID 2888 wrote to memory of 1192 2888 yryv.exe 21 PID 2888 wrote to memory of 1192 2888 yryv.exe 21 PID 2888 wrote to memory of 1192 2888 yryv.exe 21 PID 2888 wrote to memory of 1600 2888 yryv.exe 25 PID 2888 wrote to memory of 1600 2888 yryv.exe 25 PID 2888 wrote to memory of 1600 2888 yryv.exe 25 PID 2888 wrote to memory of 1600 2888 yryv.exe 25 PID 2888 wrote to memory of 1600 2888 yryv.exe 25 PID 2888 wrote to memory of 2068 2888 yryv.exe 33 PID 2888 wrote to memory of 2068 2888 yryv.exe 33 PID 2888 wrote to memory of 2068 2888 yryv.exe 33 PID 2888 wrote to memory of 2068 2888 yryv.exe 33 PID 2888 wrote to memory of 2068 2888 yryv.exe 33 PID 2888 wrote to memory of 2808 2888 yryv.exe 35 PID 2888 wrote to memory of 2808 2888 yryv.exe 35 PID 2888 wrote to memory of 2808 2888 yryv.exe 35 PID 2888 wrote to memory of 2808 2888 yryv.exe 35 PID 2888 wrote to memory of 2808 2888 yryv.exe 35 PID 2888 wrote to memory of 2028 2888 yryv.exe 36 PID 2888 wrote to memory of 2028 2888 yryv.exe 36 PID 2888 wrote to memory of 2028 2888 yryv.exe 36 PID 2888 wrote to memory of 2028 2888 yryv.exe 36 PID 2888 wrote to memory of 2028 2888 yryv.exe 36 PID 2888 wrote to memory of 656 2888 yryv.exe 38 PID 2888 wrote to memory of 656 2888 yryv.exe 38 PID 2888 wrote to memory of 656 2888 yryv.exe 38
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5fb865a6bf74142d6ec60555093cc78_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Roaming\Afamem\yryv.exe"C:\Users\Admin\AppData\Roaming\Afamem\yryv.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Roaming\Afamem\yryv.exe"C:\Users\Admin\AppData\Roaming\Afamem\yryv.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9896e053.bat"4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2068
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1600
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2808
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2028
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:656
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3036
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1784
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5c07ee9b1d1d34e360d5c32786782c55c
SHA1852f0fd9eed4af3aece4d349f8eacca3fbd889e6
SHA256f3d6bbfdf387f78a9e0f45d308e06b9a0c691d69c1f0b39a0639cab3978ffae2
SHA512fad8ff2b06bd60c2cba75e08276acfb973a12e4db433b62dac2a4b535515e196daf24de990dd8330fe52b753037ad16aa855410256f5d97996c48485b0fb8a28
-
Filesize
246KB
MD539b3b7de8d778baed613dd322180817a
SHA1bd63de6f44242d5a274675713326a76e9cc73f5f
SHA256927d05169eede02d0d28c5017b833d7f60c238c7242b8bc924b30fa0fdd923d0
SHA512bc11780ad2f8148b975026199dad5dd22761eecebd4aef29d48c56a7efdc16afdec6a75f63632cf81c49abc5a0e1f8212c94d278fe5c8279721ac1d868a905f9