Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 12:00
Static task
static1
Behavioral task
behavioral1
Sample
de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe
-
Size
320KB
-
MD5
de46c953b26ba6b1b25d2594c309da31
-
SHA1
a64325de2d7eb49aeb41dddabe3dfc3083fb8253
-
SHA256
26f22a1a9d7af7d9ba4d79adb8ae550c452ef98b0920c1c9afafa52c4ce649a7
-
SHA512
a9d27e261b44631a5797e711c0ee88f2e0d02dc111b0a0fb0f3ca154fd465871c41c32895af606fd32b780a2956db7ad34082122472d44597d31a102cde55d5c
-
SSDEEP
6144:qF0jzdT9d941odtA89nQynoeJcFBVHuE24qEDRjS:qKjzZ9d93dtAQX6VHu5QDo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2796 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2020 azal.exe -
Loads dropped DLL 4 IoCs
pid Process 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\{09E0E5E8-6808-AD4F-43B0-714965AC5254} = "C:\\Users\\Admin\\AppData\\Roaming\\Iwqe\\azal.exe" azal.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2972 set thread context of 2796 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language azal.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Privacy de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe 2020 azal.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe Token: SeSecurityPrivilege 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe Token: SeSecurityPrivilege 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 2020 azal.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2020 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2020 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2020 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2020 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2020 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2020 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2020 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 29 PID 2020 wrote to memory of 1120 2020 azal.exe 18 PID 2020 wrote to memory of 1120 2020 azal.exe 18 PID 2020 wrote to memory of 1120 2020 azal.exe 18 PID 2020 wrote to memory of 1120 2020 azal.exe 18 PID 2020 wrote to memory of 1120 2020 azal.exe 18 PID 2020 wrote to memory of 1212 2020 azal.exe 19 PID 2020 wrote to memory of 1212 2020 azal.exe 19 PID 2020 wrote to memory of 1212 2020 azal.exe 19 PID 2020 wrote to memory of 1212 2020 azal.exe 19 PID 2020 wrote to memory of 1212 2020 azal.exe 19 PID 2020 wrote to memory of 1256 2020 azal.exe 20 PID 2020 wrote to memory of 1256 2020 azal.exe 20 PID 2020 wrote to memory of 1256 2020 azal.exe 20 PID 2020 wrote to memory of 1256 2020 azal.exe 20 PID 2020 wrote to memory of 1256 2020 azal.exe 20 PID 2020 wrote to memory of 1612 2020 azal.exe 22 PID 2020 wrote to memory of 1612 2020 azal.exe 22 PID 2020 wrote to memory of 1612 2020 azal.exe 22 PID 2020 wrote to memory of 1612 2020 azal.exe 22 PID 2020 wrote to memory of 1612 2020 azal.exe 22 PID 2020 wrote to memory of 2972 2020 azal.exe 28 PID 2020 wrote to memory of 2972 2020 azal.exe 28 PID 2020 wrote to memory of 2972 2020 azal.exe 28 PID 2020 wrote to memory of 2972 2020 azal.exe 28 PID 2020 wrote to memory of 2972 2020 azal.exe 28 PID 2972 wrote to memory of 2796 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2796 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2796 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2796 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2796 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2796 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2796 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2796 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2796 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2796 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2796 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2796 2972 de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe 30
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1212
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de46c953b26ba6b1b25d2594c309da31_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Roaming\Iwqe\azal.exe"C:\Users\Admin\AppData\Roaming\Iwqe\azal.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp5fa25514.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2796
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD56df9c6a11c32bcb1446de763fc9eac62
SHA158f416f9a66f0ca49fad7938475a40309ec25bac
SHA25655446cf21791682752fee9597ea5ad240fa5087c0cd8364718e5eb749a5184d6
SHA512bf6b23899bd1ccee3cfdbf365934a5a0a95b4e16c399f6cf4d72535c6705b555dd1b0e51340c7462dfa958ae30c8fffa48b758f37de09a0657648581018b4382
-
Filesize
380B
MD530112ae2756db1b8611f7492ced7d166
SHA1fabce49faffa230eec8f8bade3ceb6c1a16fe11a
SHA256d31bb567e077c67205d7d8742df67f6d2a603c23097f3239b718fbdfc7fbd212
SHA512c52fa65807b63bc3a4ea2586cd742e84d8d8db99723f904055772da35cc38c27f6172eb7d80f20435bf0cd55018ff7bd8d56769b319ff23ab65c3b251dfb0ca8
-
Filesize
320KB
MD5e0ef57a3a619e3b3efd19a6e5f54a6c0
SHA1bee2a3592add2ff82575dc4eb893b3993de12079
SHA256f8ae2a817bea90955c264f5aeba990bcdbbb049d934fd43f82bef8c6c74308ee
SHA5124dd92b73a6c01a384a0bceb02e7ed7c86ca64cea5e4a93edd4a590e5e8b01f5db17ef21eb57bd5bed0d882891c8294eda403d49cebd47c9431d0c1361ba4e7d2