Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:09

General

  • Target

    eabbc08a8189ea8dde19c9506688f59d_JaffaCakes118.exe

  • Size

    16KB

  • MD5

    eabbc08a8189ea8dde19c9506688f59d

  • SHA1

    1105140d0052f99a9e97bc5f6384fde7e80c41ed

  • SHA256

    1aa8d41eb19116f0ece101067494bd602a78ac30c8dfa194b24ae0b444eb73fc

  • SHA512

    57539fd1eedba509e262fe8a148bb1b23d3cbb9f9bae2ece0e9efdddfaadf59082d4dc57fb80ca95f0f813ba00d8bfca824f2a46bac41e779a44c44ed4ee18f4

  • SSDEEP

    384:ruYgL+iWP3hgE7Q2BhMfVAgtCwLYU50U9gsZjH:XFhH7fMf6PwLYoVH

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eabbc08a8189ea8dde19c9506688f59d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eabbc08a8189ea8dde19c9506688f59d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\Program Files (x86)\PEL.hta"
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      PID:2400
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /im cfmon.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im cfmon.exe /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2384
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /im conlme.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im conlme.exe /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /im coiome.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im coiome.exe /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2476
    • C:\Program Files (x86)\Common Files\sessavx\coiome.exe
      "C:\Program Files (x86)\Common Files\sessavx\coiome.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c attrib -h -s -r -a "%userprofile%\Cookies\*.*"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Windows\SysWOW64\attrib.exe
          attrib -h -s -r -a "C:\Users\Admin\Cookies\*.*"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1792
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c attrib -h -s -r -a "%userprofile%\Local Settings\Temp\Cookies\*.*"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1864
        • C:\Windows\SysWOW64\attrib.exe
          attrib -h -s -r -a "C:\Users\Admin\Local Settings\Temp\Cookies\*.*"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:268
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del /f /s /q "%userprofile%\Cookies\*.*
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2792
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del /f /s /q "%userprofile%\Local Settings\Temporary Internet Files\*.*"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1044
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del /f /s /q "%userprofile%\Local Settings\Temp\Cookies\*.*"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2004
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\eabbc08a8189ea8dde19c9506688f59d_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\PEL.hta

    Filesize

    802B

    MD5

    8e0f805db5152f19ff8ddf203d93c3c1

    SHA1

    61d56c813de36bf08061497d28e99ad4cf6de84b

    SHA256

    c1035fb0a6516503223377252502a3de41e6a7337dbc25b1b503d6d72eff6f8b

    SHA512

    6d374479d9b8b3c9d3b46fea918dd36832b5438896131bd9b9844e6b9dedc6156098769fefc8efc1e5efc10fb9a0081c8eb44502035609345e43c379cbb0198f

  • \Program Files (x86)\Common Files\sessavx\coiome.exe

    Filesize

    12.0MB

    MD5

    0c35045f8b1c3e4bf1a8104289fd3eb2

    SHA1

    001f06c2b62319da3691b2e55bb08a385f53ff97

    SHA256

    cb18d0c8939b7311ee41ffd1eee2da230371ce61d939013040991a47a4720085

    SHA512

    46a9cb26513e3c15284c081c9cf07bc5791fa94c663900bb05f7db9be63540b70eb99ebcf68e2651907cddfdd966cd3af0e09a1414deb24eb91d2db451a8a394

  • memory/2520-1-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2520-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2520-7-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2520-15-0x0000000000340000-0x000000000034A000-memory.dmp

    Filesize

    40KB

  • memory/2520-14-0x0000000000340000-0x000000000034A000-memory.dmp

    Filesize

    40KB

  • memory/2520-18-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2664-17-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2664-19-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB