Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 23:51
Static task
static1
Behavioral task
behavioral1
Sample
e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe
-
Size
112KB
-
MD5
e148f4fbeade7a304cf739445e645e95
-
SHA1
c2b698d538aef5212dd650cafa04a7207845cbbf
-
SHA256
45af7217d04bc9b7119a7fd23f3d1f16f046dfdb355d21d4cd9753055e13cdb2
-
SHA512
427a8a32e7bb13a5c52f94f32b7b12668dde1a934bcb39fb4fdc7761f17ff33ab95d4bd037858345920d1d5c9a5c77f39470b0db9b0a8450235e05bf4abad567
-
SSDEEP
3072:ypkVzM+wSMZe5LxFaev6wHTWsGFkk76by46O9lr:G+wSgW3J3HT7W2by46wr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2344 igofx.exe -
Loads dropped DLL 1 IoCs
pid Process 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\{EEF606CC-AD5E-82C7-E2AC-BA4529EDCB09} = "C:\\Users\\Admin\\AppData\\Roaming\\Amguta\\igofx.exe" igofx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2496 set thread context of 2660 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Privacy e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe 2344 igofx.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe Token: SeSecurityPrivilege 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe Token: SeSecurityPrivilege 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2344 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2344 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2344 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2344 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe 31 PID 2344 wrote to memory of 1112 2344 igofx.exe 19 PID 2344 wrote to memory of 1112 2344 igofx.exe 19 PID 2344 wrote to memory of 1112 2344 igofx.exe 19 PID 2344 wrote to memory of 1112 2344 igofx.exe 19 PID 2344 wrote to memory of 1112 2344 igofx.exe 19 PID 2344 wrote to memory of 1172 2344 igofx.exe 20 PID 2344 wrote to memory of 1172 2344 igofx.exe 20 PID 2344 wrote to memory of 1172 2344 igofx.exe 20 PID 2344 wrote to memory of 1172 2344 igofx.exe 20 PID 2344 wrote to memory of 1172 2344 igofx.exe 20 PID 2344 wrote to memory of 1196 2344 igofx.exe 21 PID 2344 wrote to memory of 1196 2344 igofx.exe 21 PID 2344 wrote to memory of 1196 2344 igofx.exe 21 PID 2344 wrote to memory of 1196 2344 igofx.exe 21 PID 2344 wrote to memory of 1196 2344 igofx.exe 21 PID 2344 wrote to memory of 1308 2344 igofx.exe 25 PID 2344 wrote to memory of 1308 2344 igofx.exe 25 PID 2344 wrote to memory of 1308 2344 igofx.exe 25 PID 2344 wrote to memory of 1308 2344 igofx.exe 25 PID 2344 wrote to memory of 1308 2344 igofx.exe 25 PID 2344 wrote to memory of 2496 2344 igofx.exe 30 PID 2344 wrote to memory of 2496 2344 igofx.exe 30 PID 2344 wrote to memory of 2496 2344 igofx.exe 30 PID 2344 wrote to memory of 2496 2344 igofx.exe 30 PID 2344 wrote to memory of 2496 2344 igofx.exe 30 PID 2496 wrote to memory of 2660 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe 32 PID 2496 wrote to memory of 2660 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe 32 PID 2496 wrote to memory of 2660 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe 32 PID 2496 wrote to memory of 2660 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe 32 PID 2496 wrote to memory of 2660 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe 32 PID 2496 wrote to memory of 2660 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe 32 PID 2496 wrote to memory of 2660 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe 32 PID 2496 wrote to memory of 2660 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe 32 PID 2496 wrote to memory of 2660 2496 e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe 32 PID 2344 wrote to memory of 2232 2344 igofx.exe 34 PID 2344 wrote to memory of 2232 2344 igofx.exe 34 PID 2344 wrote to memory of 2232 2344 igofx.exe 34 PID 2344 wrote to memory of 2232 2344 igofx.exe 34 PID 2344 wrote to memory of 2232 2344 igofx.exe 34 PID 2344 wrote to memory of 340 2344 igofx.exe 35 PID 2344 wrote to memory of 340 2344 igofx.exe 35 PID 2344 wrote to memory of 340 2344 igofx.exe 35 PID 2344 wrote to memory of 340 2344 igofx.exe 35 PID 2344 wrote to memory of 340 2344 igofx.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e148f4fbeade7a304cf739445e645e95_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Roaming\Amguta\igofx.exe"C:\Users\Admin\AppData\Roaming\Amguta\igofx.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2344
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9644592e.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1308
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2232
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD534d6f348f69f7db9d30998a50b99209b
SHA142acb8323dfa067cd250f66c1c72267499e528f0
SHA25644dd3580590a3f02a22a41dc88a0ba2efbc8805548a86f4a9b599355bc16c502
SHA51221734bfdb7dc4a0bf6fe85351a3ecf44cab9452fde3b61fe5f0d22a948370855371ed19fbbaf5e30be3e4750b0ca87e07040a0496f88a9792e36a84be5143b40
-
Filesize
380B
MD56e493533404c91e24c17decd606cefe3
SHA109a7b82b1a0e82a39cd9103d44295460a1945771
SHA256a4e9fb4e15fd2c8cc5d1b3a10e42df0694f34022e63e033d54ce24c131ba3eb1
SHA512ba6bade4ef5ea0621dfb79e8f4799343a8a188efc93c752247bd92ac01a10895fd26353bc28a9d0cd9a0a420909f2baae981eca196257fbea74e13b469a884f5
-
Filesize
112KB
MD526bfd06d36a5bb125fcdfbcfcd52f887
SHA1c1c1126bf8e8e17b54cf58dedb0c33b0f9ff131b
SHA2567d85abb445047cccdd096cfc1b959f2b4009c0ca2df33152f1dc7b42a352080f
SHA512dbb60327cdb77b5c69f43ee3195c191c3b7786001ab6f98987602062ba392696b53266dc150217d93dcd39b4a20369fd31137e9471746592b4eeefc7bdcfa292