Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe
-
Size
98KB
-
MD5
e93b8f5dc41f87a69fcf19115e985860
-
SHA1
51c55e7ee1d68c26918c1d6e5082dd60f08cde6d
-
SHA256
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2
-
SHA512
787bfdc8fad1d9cdf52f58d07ce91fab86f5b9a77891523722e1e71fb1087ee43fa07d1557158ce4b6fb982d30c2a208103c0d032b7bd6a3cec1254ff0c1b081
-
SSDEEP
1536:DOoZ86iHPT3qqj7XHLLvXArePDNlv9AEQKzcVsN9+GUROW3zC1hDaMrAJg7Ub+SJ:DdjsnvXtNlebocVsnUROMzC1NAJQO
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
pid Process 2716 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1996 hucgq.exe 2372 hucgq.exe -
Loads dropped DLL 2 IoCs
pid Process 2340 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 1996 hucgq.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\hucgq.exe\" /r" e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1984 set thread context of 2340 1984 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 30 PID 1996 set thread context of 2372 1996 hucgq.exe 32 PID 2372 set thread context of 1636 2372 hucgq.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hucgq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hucgq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2340 1984 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2340 1984 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2340 1984 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2340 1984 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2340 1984 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2340 1984 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2340 1984 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2340 1984 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2340 1984 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 30 PID 2340 wrote to memory of 1996 2340 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 31 PID 2340 wrote to memory of 1996 2340 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 31 PID 2340 wrote to memory of 1996 2340 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 31 PID 2340 wrote to memory of 1996 2340 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 31 PID 1996 wrote to memory of 2372 1996 hucgq.exe 32 PID 1996 wrote to memory of 2372 1996 hucgq.exe 32 PID 1996 wrote to memory of 2372 1996 hucgq.exe 32 PID 1996 wrote to memory of 2372 1996 hucgq.exe 32 PID 1996 wrote to memory of 2372 1996 hucgq.exe 32 PID 1996 wrote to memory of 2372 1996 hucgq.exe 32 PID 1996 wrote to memory of 2372 1996 hucgq.exe 32 PID 1996 wrote to memory of 2372 1996 hucgq.exe 32 PID 1996 wrote to memory of 2372 1996 hucgq.exe 32 PID 2340 wrote to memory of 2716 2340 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 34 PID 2340 wrote to memory of 2716 2340 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 34 PID 2340 wrote to memory of 2716 2340 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 34 PID 2340 wrote to memory of 2716 2340 e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe 34 PID 2372 wrote to memory of 1636 2372 hucgq.exe 33 PID 2372 wrote to memory of 1636 2372 hucgq.exe 33 PID 2372 wrote to memory of 1636 2372 hucgq.exe 33 PID 2372 wrote to memory of 1636 2372 hucgq.exe 33 PID 2372 wrote to memory of 1636 2372 hucgq.exe 33 PID 2372 wrote to memory of 1636 2372 hucgq.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\hucgq.exe"C:\Users\Admin\hucgq.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\hucgq.exe"C:\Users\Admin\hucgq.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1636
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\8775.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD529ae634b924626f108a4857622116511
SHA1f293e14cda8bb3118184ed0cb47f37204ce7c9d5
SHA2563663aa1e7897d2e6a4d0a0661a2c0a2e1f75dde26878b21632db1b883dded2a5
SHA5128bb34df5a03af6f3b738cde5e5ebf70f4c4016c8c2cf38c350aad04670cbc113d0bddd191b88d694ab473f1a664e5ed765dd98793f2917c705410db3836e22f6
-
Filesize
98KB
MD5e93b8f5dc41f87a69fcf19115e985860
SHA151c55e7ee1d68c26918c1d6e5082dd60f08cde6d
SHA256ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2
SHA512787bfdc8fad1d9cdf52f58d07ce91fab86f5b9a77891523722e1e71fb1087ee43fa07d1557158ce4b6fb982d30c2a208103c0d032b7bd6a3cec1254ff0c1b081