Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 17:30
Static task
static1
Behavioral task
behavioral1
Sample
de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe
-
Size
276KB
-
MD5
de919e8bb34955cbbcd20930564e0908
-
SHA1
2ac8129ac0e64b989a9c445f909ea6f7a84d795b
-
SHA256
8186caea49adfbb45e783dfcc5e3c8c30e328ce3383e033475e60ab0c92e1247
-
SHA512
802a2c25321eae9c8c6115d16e8570f5d6fc96ea99bb030557b312484363bafb495a96641b0050f9d08c44136012732f1ad4ef58d38a17b289007a1a411b738f
-
SSDEEP
6144:tCFVCW9rUSUa4klU2SC9IZCNkyBr0i51eQwprAvsuA6L:tCFVXrUSCqUFCXNkyBt1e9rAvEY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1756 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 564 ejwu.exe -
Loads dropped DLL 2 IoCs
pid Process 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\{ED60B7C8-3C80-AD4F-2955-D827011AFB3A} = "C:\\Users\\Admin\\AppData\\Roaming\\Sipa\\ejwu.exe" ejwu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2160 set thread context of 1756 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ejwu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Privacy de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe 564 ejwu.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe Token: SeSecurityPrivilege 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe Token: SeSecurityPrivilege 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 564 ejwu.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2160 wrote to memory of 564 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 29 PID 2160 wrote to memory of 564 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 29 PID 2160 wrote to memory of 564 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 29 PID 2160 wrote to memory of 564 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 29 PID 564 wrote to memory of 1232 564 ejwu.exe 18 PID 564 wrote to memory of 1232 564 ejwu.exe 18 PID 564 wrote to memory of 1232 564 ejwu.exe 18 PID 564 wrote to memory of 1232 564 ejwu.exe 18 PID 564 wrote to memory of 1232 564 ejwu.exe 18 PID 564 wrote to memory of 1304 564 ejwu.exe 19 PID 564 wrote to memory of 1304 564 ejwu.exe 19 PID 564 wrote to memory of 1304 564 ejwu.exe 19 PID 564 wrote to memory of 1304 564 ejwu.exe 19 PID 564 wrote to memory of 1304 564 ejwu.exe 19 PID 564 wrote to memory of 1364 564 ejwu.exe 20 PID 564 wrote to memory of 1364 564 ejwu.exe 20 PID 564 wrote to memory of 1364 564 ejwu.exe 20 PID 564 wrote to memory of 1364 564 ejwu.exe 20 PID 564 wrote to memory of 1364 564 ejwu.exe 20 PID 564 wrote to memory of 1620 564 ejwu.exe 22 PID 564 wrote to memory of 1620 564 ejwu.exe 22 PID 564 wrote to memory of 1620 564 ejwu.exe 22 PID 564 wrote to memory of 1620 564 ejwu.exe 22 PID 564 wrote to memory of 1620 564 ejwu.exe 22 PID 564 wrote to memory of 2160 564 ejwu.exe 28 PID 564 wrote to memory of 2160 564 ejwu.exe 28 PID 564 wrote to memory of 2160 564 ejwu.exe 28 PID 564 wrote to memory of 2160 564 ejwu.exe 28 PID 564 wrote to memory of 2160 564 ejwu.exe 28 PID 2160 wrote to memory of 1756 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 30 PID 2160 wrote to memory of 1756 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 30 PID 2160 wrote to memory of 1756 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 30 PID 2160 wrote to memory of 1756 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 30 PID 2160 wrote to memory of 1756 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 30 PID 2160 wrote to memory of 1756 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 30 PID 2160 wrote to memory of 1756 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 30 PID 2160 wrote to memory of 1756 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 30 PID 2160 wrote to memory of 1756 2160 de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe 30
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1232
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1304
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de919e8bb34955cbbcd20930564e0908_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Roaming\Sipa\ejwu.exe"C:\Users\Admin\AppData\Roaming\Sipa\ejwu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:564
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6748e390.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1756
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5f0703bd07141417efe73b88a7bfca426
SHA142eeb382f01d7129f8fae33341e750dda1652bf3
SHA25665314c4d8172cd54105fb93ae2753b57bda5def8004fc8604b6ee87897edc378
SHA512d4ab3a2f99eae036abe739038f0fb8a96d6809f7715fd331c4130f13f886975405b4abaea3df935c824af2993a05791b386b7a4f98cf344ba2a168446e762643
-
Filesize
380B
MD5e04a1d0a74c7560e1f41d098fc88adb6
SHA1ebe4171018e90e9d19abf0c08e833105a20ca7e6
SHA256c371c0d842cee161872f94171f887f982edcbd4d9b08fca76e5032df50d266d2
SHA5124ec11c8c217aa8a867440b5a7fc346f3d22929cc13d910c4828bb7a935f9f4808b3feed2236087531fa749f7f6360da19c5c61f7fa71c3df427b80fa2901a7b9
-
Filesize
276KB
MD5e2a838eaa16c265bc5f3b50024008d23
SHA1f9d7631c6376cd91a33469361582587c3d3b1af7
SHA256f547f235db8c407f1c9f8c972beeddcf1e12154089c8dfedf2ede7ed142a3bc3
SHA512b1b04be6b5a342020d229109b885ae543892eca5796ff3125520be1b4ab52c3da61509baf4995ce21e808c906c2fec64792911132e98a3018149af5e3b696fe8