Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe
-
Size
443KB
-
MD5
eaa2475e90232a404f955407d743fe90
-
SHA1
3f853949f48429e5a83e8f4a4dfa79ab8a472428
-
SHA256
a1637dbe8b381cf5bc142a13bc8803bd8ad1cc38ca5580195affea3a186b9edc
-
SHA512
d656f54cbae3e644945f6caa8732289a2cd75796fe51b809bc61912529ae620ae373992deeeddd48bc88bd1f199415302fc092c453863c1ecf9b55be341e928f
-
SSDEEP
6144:/bzzv2J/jXGI/q3PW1yzF3ty5w9GhxQqdaV2i/eRoPJ5ln6Zd8HxSe2l:y7SqMz8QqdXi/eRoPThC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2232 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2568 adod.exe -
Loads dropped DLL 2 IoCs
pid Process 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D5718048-3C80-AD4F-91EC-8CC98FD5AFD4} = "C:\\Users\\Admin\\AppData\\Roaming\\Obto\\adod.exe" adod.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2748 set thread context of 2232 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Privacy eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe 2568 adod.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 2568 adod.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2568 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2568 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2568 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2568 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1120 2568 adod.exe 19 PID 2568 wrote to memory of 1120 2568 adod.exe 19 PID 2568 wrote to memory of 1120 2568 adod.exe 19 PID 2568 wrote to memory of 1120 2568 adod.exe 19 PID 2568 wrote to memory of 1120 2568 adod.exe 19 PID 2568 wrote to memory of 1180 2568 adod.exe 20 PID 2568 wrote to memory of 1180 2568 adod.exe 20 PID 2568 wrote to memory of 1180 2568 adod.exe 20 PID 2568 wrote to memory of 1180 2568 adod.exe 20 PID 2568 wrote to memory of 1180 2568 adod.exe 20 PID 2568 wrote to memory of 1208 2568 adod.exe 21 PID 2568 wrote to memory of 1208 2568 adod.exe 21 PID 2568 wrote to memory of 1208 2568 adod.exe 21 PID 2568 wrote to memory of 1208 2568 adod.exe 21 PID 2568 wrote to memory of 1208 2568 adod.exe 21 PID 2568 wrote to memory of 1696 2568 adod.exe 25 PID 2568 wrote to memory of 1696 2568 adod.exe 25 PID 2568 wrote to memory of 1696 2568 adod.exe 25 PID 2568 wrote to memory of 1696 2568 adod.exe 25 PID 2568 wrote to memory of 1696 2568 adod.exe 25 PID 2568 wrote to memory of 2748 2568 adod.exe 29 PID 2568 wrote to memory of 2748 2568 adod.exe 29 PID 2568 wrote to memory of 2748 2568 adod.exe 29 PID 2568 wrote to memory of 2748 2568 adod.exe 29 PID 2568 wrote to memory of 2748 2568 adod.exe 29 PID 2748 wrote to memory of 2232 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2232 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2232 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2232 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2232 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2232 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2232 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2232 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2232 2748 eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaa2475e90232a404f955407d743fe90_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Roaming\Obto\adod.exe"C:\Users\Admin\AppData\Roaming\Obto\adod.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp5b379d0e.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2232
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD51e90799e1b9ff68428f2dff78a848e75
SHA16262e3288bd984e06614895dcf37e19cef36b226
SHA25624a33bc4a1c27638532ca760f53f5c6690cbad963fb96594d29fc26c30317d27
SHA51253e97435b88f7904f8e1e36cb59ca3025f2c2f4b7cff4984a6af74bc0316e9d7684fb30d75d8aaff47ba35b7d4922a02d89f2f56dd021cac35ef86e6f13b078e
-
Filesize
443KB
MD57e683a1e329b36e4a2df0603d18c4e8c
SHA16f078827ab246fffdd39d0db051b44de12051e80
SHA256eddcec7a1029dfd508e880a148e4f1f6f8ad130344f502af869c64b75e520daf
SHA51291ec211dceb96b278a6bd7ceeb0c44429187fb91e03153da55155ae0ff2e8b0930becc73f6cedccdd270b72f8792a3e62cc1a46a7447f707fee7d0d02144d821