Analysis
-
max time kernel
30s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
eac3188db1de49c9b748084279796284_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac3188db1de49c9b748084279796284_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac3188db1de49c9b748084279796284_JaffaCakes118.exe
-
Size
14KB
-
MD5
eac3188db1de49c9b748084279796284
-
SHA1
f694b0f87c5e6dc435678f14ca1ba50da93f2928
-
SHA256
06bd318cc01755391848668d46140261703fe965699f34dd48fcb85049dd8183
-
SHA512
df36a6f81fa8bb4a8e522ab64b1fc6f606e6d6b357ff089917d06ced7650a60c46c3af43a62b35990e0f928f28ba78c2ef78a9379e717a16f3e9496bfda1491b
-
SSDEEP
384:tczoYdP1jtpypbtB0celpCWDaiBy49vwpPpQ6L0WIc9Qe:OMI1jtMZcl4WDFyqwxS6L79
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ziqfedqt.dll = "{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}" eac3188db1de49c9b748084279796284_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2836 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2412 eac3188db1de49c9b748084279796284_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ziqfedqt.tmp eac3188db1de49c9b748084279796284_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ziqfedqt.tmp eac3188db1de49c9b748084279796284_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ziqfedqt.nls eac3188db1de49c9b748084279796284_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac3188db1de49c9b748084279796284_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9} eac3188db1de49c9b748084279796284_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32 eac3188db1de49c9b748084279796284_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32\ = "C:\\Windows\\SysWow64\\ziqfedqt.dll" eac3188db1de49c9b748084279796284_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32\ThreadingModel = "Apartment" eac3188db1de49c9b748084279796284_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2412 eac3188db1de49c9b748084279796284_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2412 eac3188db1de49c9b748084279796284_JaffaCakes118.exe 2412 eac3188db1de49c9b748084279796284_JaffaCakes118.exe 2412 eac3188db1de49c9b748084279796284_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2836 2412 eac3188db1de49c9b748084279796284_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2836 2412 eac3188db1de49c9b748084279796284_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2836 2412 eac3188db1de49c9b748084279796284_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2836 2412 eac3188db1de49c9b748084279796284_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac3188db1de49c9b748084279796284_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eac3188db1de49c9b748084279796284_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\510.tmp.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5ca815fdae03d31dfaf7b36b4d619c92e
SHA12a1a78d5feae5b28598878fae1aef67d987d233b
SHA2561bdfd4ac43384a0e45e87f70680b5d14a8d7b01d362ea40ab98b4ceeaf4e8410
SHA512f676d0eb70a805eec4eba1602252f0cd2cd0353facbf14abe37d70ad190ff3cf11e05b8faf505176d72267851638782b5a6c2e1b7332f0d41ac3c8319ea7d918
-
Filesize
428B
MD5e59c68d7ddcda526765a879e63228e1e
SHA16d26b4ef1f31858e7f1332bb20c2c49d0472ede6
SHA256135b283bdb69aed077557005e816d8b8eeaece4323f4093a76f4eb2d55be1b94
SHA5124ddcbd27da1d5778f1558efc834fd7cc8a1aec7257c40ca3f0c2092a65563906ff85078ed9d7c68c5386d18e6f273ea0345a7e55cac8fcf447684d5b8e43d7b1
-
Filesize
2.3MB
MD5db268dc124f2a757dbd8aa9146be4f2d
SHA1ddf6525e851f11c5c61afb3db5158a55f74d0130
SHA25657b905ccad8929728b374d1101792d0bdab59a722ef793cd366d6b99dc1df30f
SHA512c6ff8699961dff30e4b7b41a52da1b18a6216b330a499824b7bf5366ea0e96db295ed5d9be2a42f3766c6f7d5acb30a64c8f803c2a21781474d10f15bb16ad43