Analysis
-
max time kernel
94s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe
-
Size
112KB
-
MD5
e16e69b4f83ffd653cd7a61bf91e06b6
-
SHA1
5cdb8c240b4f5e8b9a8c12fcb61e949b6f221d70
-
SHA256
49ed4585a1eeecf36fa7f8bbf29f5061499c87b6fb4d81f7274ee101f9c96759
-
SHA512
730944b3f3c5555e15cd0123f72140099028d87b255e4d03efdc6b7291dcc2ef8c1e93a12a12899cc54d5110596f2939b85da15f1ef7850fcdabd45a021c9e1d
-
SSDEEP
3072:kSCKd4da3sopm0V0p5Uq8esbyaJUuJDUa/dDcUh:kSX2osd/2byaJRn/WUh
Malware Config
Signatures
-
Executes dropped EXE 19 IoCs
pid Process 5000 thakdixu.exe 4572 thakdixu.exe 1412 qqksygwe.exe 5044 qqksygwe.exe 1596 ticiqcec.exe 1204 ticiqcec.exe 1608 voqtgufg.exe 4660 voqtgufg.exe 4508 yvfvvmpc.exe 3880 yvfvvmpc.exe 3736 dwnqdrvi.exe 4880 dwnqdrvi.exe 2440 iukgrsut.exe 2424 iukgrsut.exe 2284 ndsbhpaz.exe 632 ndsbhpaz.exe 4736 txmwkmaq.exe 432 txmwkmaq.exe 2004 bqlwzbwe.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ticiqcec.exe qqksygwe.exe File created C:\Windows\SysWOW64\yvfvvmpc.exe voqtgufg.exe File opened for modification C:\Windows\SysWOW64\dwnqdrvi.exe yvfvvmpc.exe File created C:\Windows\SysWOW64\iukgrsut.exe dwnqdrvi.exe File created C:\Windows\SysWOW64\txmwkmaq.exe ndsbhpaz.exe File opened for modification C:\Windows\SysWOW64\thakdixu.exe e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe File created C:\Windows\SysWOW64\ndsbhpaz.exe iukgrsut.exe File created C:\Windows\SysWOW64\bqlwzbwe.exe txmwkmaq.exe File opened for modification C:\Windows\SysWOW64\iukgrsut.exe dwnqdrvi.exe File opened for modification C:\Windows\SysWOW64\ndsbhpaz.exe iukgrsut.exe File opened for modification C:\Windows\SysWOW64\bqlwzbwe.exe txmwkmaq.exe File created C:\Windows\SysWOW64\thakdixu.exe e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe File created C:\Windows\SysWOW64\voqtgufg.exe ticiqcec.exe File opened for modification C:\Windows\SysWOW64\voqtgufg.exe ticiqcec.exe File opened for modification C:\Windows\SysWOW64\yvfvvmpc.exe voqtgufg.exe File created C:\Windows\SysWOW64\dwnqdrvi.exe yvfvvmpc.exe File created C:\Windows\SysWOW64\qqksygwe.exe thakdixu.exe File opened for modification C:\Windows\SysWOW64\qqksygwe.exe thakdixu.exe File created C:\Windows\SysWOW64\ticiqcec.exe qqksygwe.exe File opened for modification C:\Windows\SysWOW64\txmwkmaq.exe ndsbhpaz.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 2696 set thread context of 4888 2696 e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe 84 PID 5000 set thread context of 4572 5000 thakdixu.exe 87 PID 1412 set thread context of 5044 1412 qqksygwe.exe 89 PID 1596 set thread context of 1204 1596 ticiqcec.exe 91 PID 1608 set thread context of 4660 1608 voqtgufg.exe 93 PID 4508 set thread context of 3880 4508 yvfvvmpc.exe 95 PID 3736 set thread context of 4880 3736 dwnqdrvi.exe 97 PID 2440 set thread context of 2424 2440 iukgrsut.exe 99 PID 2284 set thread context of 632 2284 ndsbhpaz.exe 101 PID 4736 set thread context of 432 4736 txmwkmaq.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thakdixu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ticiqcec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndsbhpaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txmwkmaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqlwzbwe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yvfvvmpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndsbhpaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qqksygwe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qqksygwe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language voqtgufg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwnqdrvi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iukgrsut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iukgrsut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txmwkmaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thakdixu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ticiqcec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language voqtgufg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yvfvvmpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwnqdrvi.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2696 e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe 2696 e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe 5000 thakdixu.exe 5000 thakdixu.exe 1412 qqksygwe.exe 1412 qqksygwe.exe 1596 ticiqcec.exe 1596 ticiqcec.exe 1608 voqtgufg.exe 1608 voqtgufg.exe 4508 yvfvvmpc.exe 4508 yvfvvmpc.exe 3736 dwnqdrvi.exe 3736 dwnqdrvi.exe 2440 iukgrsut.exe 2440 iukgrsut.exe 2284 ndsbhpaz.exe 2284 ndsbhpaz.exe 4736 txmwkmaq.exe 4736 txmwkmaq.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2696 wrote to memory of 4888 2696 e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe 84 PID 2696 wrote to memory of 4888 2696 e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe 84 PID 2696 wrote to memory of 4888 2696 e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe 84 PID 2696 wrote to memory of 4888 2696 e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe 84 PID 2696 wrote to memory of 4888 2696 e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe 84 PID 4888 wrote to memory of 5000 4888 e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe 86 PID 4888 wrote to memory of 5000 4888 e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe 86 PID 4888 wrote to memory of 5000 4888 e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe 86 PID 5000 wrote to memory of 4572 5000 thakdixu.exe 87 PID 5000 wrote to memory of 4572 5000 thakdixu.exe 87 PID 5000 wrote to memory of 4572 5000 thakdixu.exe 87 PID 5000 wrote to memory of 4572 5000 thakdixu.exe 87 PID 5000 wrote to memory of 4572 5000 thakdixu.exe 87 PID 4572 wrote to memory of 1412 4572 thakdixu.exe 88 PID 4572 wrote to memory of 1412 4572 thakdixu.exe 88 PID 4572 wrote to memory of 1412 4572 thakdixu.exe 88 PID 1412 wrote to memory of 5044 1412 qqksygwe.exe 89 PID 1412 wrote to memory of 5044 1412 qqksygwe.exe 89 PID 1412 wrote to memory of 5044 1412 qqksygwe.exe 89 PID 1412 wrote to memory of 5044 1412 qqksygwe.exe 89 PID 1412 wrote to memory of 5044 1412 qqksygwe.exe 89 PID 5044 wrote to memory of 1596 5044 qqksygwe.exe 90 PID 5044 wrote to memory of 1596 5044 qqksygwe.exe 90 PID 5044 wrote to memory of 1596 5044 qqksygwe.exe 90 PID 1596 wrote to memory of 1204 1596 ticiqcec.exe 91 PID 1596 wrote to memory of 1204 1596 ticiqcec.exe 91 PID 1596 wrote to memory of 1204 1596 ticiqcec.exe 91 PID 1596 wrote to memory of 1204 1596 ticiqcec.exe 91 PID 1596 wrote to memory of 1204 1596 ticiqcec.exe 91 PID 1204 wrote to memory of 1608 1204 ticiqcec.exe 92 PID 1204 wrote to memory of 1608 1204 ticiqcec.exe 92 PID 1204 wrote to memory of 1608 1204 ticiqcec.exe 92 PID 1608 wrote to memory of 4660 1608 voqtgufg.exe 93 PID 1608 wrote to memory of 4660 1608 voqtgufg.exe 93 PID 1608 wrote to memory of 4660 1608 voqtgufg.exe 93 PID 1608 wrote to memory of 4660 1608 voqtgufg.exe 93 PID 1608 wrote to memory of 4660 1608 voqtgufg.exe 93 PID 4660 wrote to memory of 4508 4660 voqtgufg.exe 94 PID 4660 wrote to memory of 4508 4660 voqtgufg.exe 94 PID 4660 wrote to memory of 4508 4660 voqtgufg.exe 94 PID 4508 wrote to memory of 3880 4508 yvfvvmpc.exe 95 PID 4508 wrote to memory of 3880 4508 yvfvvmpc.exe 95 PID 4508 wrote to memory of 3880 4508 yvfvvmpc.exe 95 PID 4508 wrote to memory of 3880 4508 yvfvvmpc.exe 95 PID 4508 wrote to memory of 3880 4508 yvfvvmpc.exe 95 PID 3880 wrote to memory of 3736 3880 yvfvvmpc.exe 96 PID 3880 wrote to memory of 3736 3880 yvfvvmpc.exe 96 PID 3880 wrote to memory of 3736 3880 yvfvvmpc.exe 96 PID 3736 wrote to memory of 4880 3736 dwnqdrvi.exe 97 PID 3736 wrote to memory of 4880 3736 dwnqdrvi.exe 97 PID 3736 wrote to memory of 4880 3736 dwnqdrvi.exe 97 PID 3736 wrote to memory of 4880 3736 dwnqdrvi.exe 97 PID 3736 wrote to memory of 4880 3736 dwnqdrvi.exe 97 PID 4880 wrote to memory of 2440 4880 dwnqdrvi.exe 98 PID 4880 wrote to memory of 2440 4880 dwnqdrvi.exe 98 PID 4880 wrote to memory of 2440 4880 dwnqdrvi.exe 98 PID 2440 wrote to memory of 2424 2440 iukgrsut.exe 99 PID 2440 wrote to memory of 2424 2440 iukgrsut.exe 99 PID 2440 wrote to memory of 2424 2440 iukgrsut.exe 99 PID 2440 wrote to memory of 2424 2440 iukgrsut.exe 99 PID 2440 wrote to memory of 2424 2440 iukgrsut.exe 99 PID 2424 wrote to memory of 2284 2424 iukgrsut.exe 100 PID 2424 wrote to memory of 2284 2424 iukgrsut.exe 100 PID 2424 wrote to memory of 2284 2424 iukgrsut.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\thakdixu.exeC:\Windows\system32\thakdixu.exe 1088 "C:\Users\Admin\AppData\Local\Temp\e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\thakdixu.exe1088 C:\Users\Admin\AppData\Local\Temp\e16e69b4f83ffd653cd7a61bf91e06b6_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\qqksygwe.exeC:\Windows\system32\qqksygwe.exe 1032 "C:\Windows\SysWOW64\thakdixu.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\qqksygwe.exe1032 C:\Windows\SysWOW64\thakdixu.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\ticiqcec.exeC:\Windows\system32\ticiqcec.exe 996 "C:\Windows\SysWOW64\qqksygwe.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\ticiqcec.exe996 C:\Windows\SysWOW64\qqksygwe.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\voqtgufg.exeC:\Windows\system32\voqtgufg.exe 1004 "C:\Windows\SysWOW64\ticiqcec.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\voqtgufg.exe1004 C:\Windows\SysWOW64\ticiqcec.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\yvfvvmpc.exeC:\Windows\system32\yvfvvmpc.exe 1012 "C:\Windows\SysWOW64\voqtgufg.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\yvfvvmpc.exe1012 C:\Windows\SysWOW64\voqtgufg.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\dwnqdrvi.exeC:\Windows\system32\dwnqdrvi.exe 1012 "C:\Windows\SysWOW64\yvfvvmpc.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\dwnqdrvi.exe1012 C:\Windows\SysWOW64\yvfvvmpc.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\iukgrsut.exeC:\Windows\system32\iukgrsut.exe 992 "C:\Windows\SysWOW64\dwnqdrvi.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\iukgrsut.exe992 C:\Windows\SysWOW64\dwnqdrvi.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\ndsbhpaz.exeC:\Windows\system32\ndsbhpaz.exe 1000 "C:\Windows\SysWOW64\iukgrsut.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\ndsbhpaz.exe1000 C:\Windows\SysWOW64\iukgrsut.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:632 -
C:\Windows\SysWOW64\txmwkmaq.exeC:\Windows\system32\txmwkmaq.exe 1032 "C:\Windows\SysWOW64\ndsbhpaz.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4736 -
C:\Windows\SysWOW64\txmwkmaq.exe1032 C:\Windows\SysWOW64\ndsbhpaz.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:432 -
C:\Windows\SysWOW64\bqlwzbwe.exeC:\Windows\system32\bqlwzbwe.exe 1004 "C:\Windows\SysWOW64\txmwkmaq.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2004
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD5e16e69b4f83ffd653cd7a61bf91e06b6
SHA15cdb8c240b4f5e8b9a8c12fcb61e949b6f221d70
SHA25649ed4585a1eeecf36fa7f8bbf29f5061499c87b6fb4d81f7274ee101f9c96759
SHA512730944b3f3c5555e15cd0123f72140099028d87b255e4d03efdc6b7291dcc2ef8c1e93a12a12899cc54d5110596f2939b85da15f1ef7850fcdabd45a021c9e1d