Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 06:58
Static task
static1
Behavioral task
behavioral1
Sample
dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe
-
Size
169KB
-
MD5
dde7cbf86f417af475da245ca768b89b
-
SHA1
697f90b33dd16a9d349824724d35f2ff56fe3a54
-
SHA256
44096f069d68b101bae728c5c3d9b025245962ace023753b1aaa761aff80b880
-
SHA512
99a80b453a9d52f2c69fb4752a451361e9791e8bc615c6327a1d3ccd53c535ee8c6cf281839ba6cf6b736af4a2b93da6d9a54552387d9e3cdd80e36c51cee28e
-
SSDEEP
3072:UNnz4Uk1hIMY8JCLiwMiCQcLUZtFscyB+uSJJtqbqSy1mRsn:UNXkJY8JGCbZ9B+uGi4mRA
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
pid Process 540 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2540 puofmip.exe 2560 puofmip.exe -
Loads dropped DLL 3 IoCs
pid Process 2732 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 2732 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 2540 puofmip.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\puofmip.exe\" /r" dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2132 set thread context of 2732 2132 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 30 PID 2540 set thread context of 2560 2540 puofmip.exe 32 PID 2560 set thread context of 2528 2560 puofmip.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puofmip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puofmip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2732 2132 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2732 2132 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2732 2132 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2732 2132 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2732 2132 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2732 2132 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2732 2132 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2732 2132 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2732 2132 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2540 2732 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2540 2732 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2540 2732 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2540 2732 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 31 PID 2540 wrote to memory of 2560 2540 puofmip.exe 32 PID 2540 wrote to memory of 2560 2540 puofmip.exe 32 PID 2540 wrote to memory of 2560 2540 puofmip.exe 32 PID 2540 wrote to memory of 2560 2540 puofmip.exe 32 PID 2540 wrote to memory of 2560 2540 puofmip.exe 32 PID 2540 wrote to memory of 2560 2540 puofmip.exe 32 PID 2540 wrote to memory of 2560 2540 puofmip.exe 32 PID 2540 wrote to memory of 2560 2540 puofmip.exe 32 PID 2540 wrote to memory of 2560 2540 puofmip.exe 32 PID 2560 wrote to memory of 2528 2560 puofmip.exe 33 PID 2560 wrote to memory of 2528 2560 puofmip.exe 33 PID 2560 wrote to memory of 2528 2560 puofmip.exe 33 PID 2560 wrote to memory of 2528 2560 puofmip.exe 33 PID 2560 wrote to memory of 2528 2560 puofmip.exe 33 PID 2560 wrote to memory of 2528 2560 puofmip.exe 33 PID 2732 wrote to memory of 540 2732 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 34 PID 2732 wrote to memory of 540 2732 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 34 PID 2732 wrote to memory of 540 2732 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 34 PID 2732 wrote to memory of 540 2732 dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dde7cbf86f417af475da245ca768b89b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\puofmip.exe"C:\Users\Admin\puofmip.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\puofmip.exe"C:\Users\Admin\puofmip.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2528
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\8154.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD5d8a1ccde1e5a8a2f0bc8c55f0f92a32f
SHA17f642679644190656a140576cfd4d01f3ad22c76
SHA2563a94ea1090534686c399a5f7676bc0d8cd5856c9a98625cfb2932c8e88d44d9c
SHA51278044bc9e5ad5c8b1f8eec58c797c2d5dbb7ea22b7e8182fd8fd913180b66bc4006443307dfc7e7933fb8f33c73a51e186e77e92eaad10ee89db00205c6dc697
-
Filesize
169KB
MD5dde7cbf86f417af475da245ca768b89b
SHA1697f90b33dd16a9d349824724d35f2ff56fe3a54
SHA25644096f069d68b101bae728c5c3d9b025245962ace023753b1aaa761aff80b880
SHA51299a80b453a9d52f2c69fb4752a451361e9791e8bc615c6327a1d3ccd53c535ee8c6cf281839ba6cf6b736af4a2b93da6d9a54552387d9e3cdd80e36c51cee28e