Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe
-
Size
333KB
-
MD5
eb80f6136a793be7e64573325f247c0f
-
SHA1
aff1d4460971e3d7952744f1cef20690f6f0ba69
-
SHA256
025e54e84155508d05f47e452bdd572c8507c8cfe7d9ea0080dd0d6b94697c66
-
SHA512
34f93c1202cf77e6ca0da3636d983e7269226f20ed3e0f797269047d5cd38766362bf05e121f4ed5705396667ab6bc42afa6776cf6d5b0bcd873fbbd24a3bef2
-
SSDEEP
6144:9Q8gX7301UCihjXgT/CvDFqqAUoXUp3TNhi/+szYje0Sofo1m:9Q57HjA/YNYXUBNgJMHS1Q
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2828 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2896 omyj.exe 2612 omyj.exe -
Loads dropped DLL 2 IoCs
pid Process 2792 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 2792 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D9E5F948-3C80-AD4F-E7F9-6BD2C10548CF} = "C:\\Users\\Admin\\AppData\\Roaming\\Ewyby\\omyj.exe" omyj.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2764 set thread context of 2792 2764 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 30 PID 2896 set thread context of 2612 2896 omyj.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe 2612 omyj.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2792 2764 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2792 2764 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2792 2764 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2792 2764 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2792 2764 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2792 2764 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2792 2764 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2792 2764 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2792 2764 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2896 2792 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 31 PID 2792 wrote to memory of 2896 2792 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 31 PID 2792 wrote to memory of 2896 2792 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 31 PID 2792 wrote to memory of 2896 2792 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 31 PID 2896 wrote to memory of 2612 2896 omyj.exe 32 PID 2896 wrote to memory of 2612 2896 omyj.exe 32 PID 2896 wrote to memory of 2612 2896 omyj.exe 32 PID 2896 wrote to memory of 2612 2896 omyj.exe 32 PID 2896 wrote to memory of 2612 2896 omyj.exe 32 PID 2896 wrote to memory of 2612 2896 omyj.exe 32 PID 2896 wrote to memory of 2612 2896 omyj.exe 32 PID 2896 wrote to memory of 2612 2896 omyj.exe 32 PID 2896 wrote to memory of 2612 2896 omyj.exe 32 PID 2792 wrote to memory of 2828 2792 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 33 PID 2792 wrote to memory of 2828 2792 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 33 PID 2792 wrote to memory of 2828 2792 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 33 PID 2792 wrote to memory of 2828 2792 eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe 33 PID 2612 wrote to memory of 1080 2612 omyj.exe 17 PID 2612 wrote to memory of 1080 2612 omyj.exe 17 PID 2612 wrote to memory of 1080 2612 omyj.exe 17 PID 2612 wrote to memory of 1080 2612 omyj.exe 17 PID 2612 wrote to memory of 1080 2612 omyj.exe 17 PID 2612 wrote to memory of 1096 2612 omyj.exe 19 PID 2612 wrote to memory of 1096 2612 omyj.exe 19 PID 2612 wrote to memory of 1096 2612 omyj.exe 19 PID 2612 wrote to memory of 1096 2612 omyj.exe 19 PID 2612 wrote to memory of 1096 2612 omyj.exe 19 PID 2612 wrote to memory of 1160 2612 omyj.exe 20 PID 2612 wrote to memory of 1160 2612 omyj.exe 20 PID 2612 wrote to memory of 1160 2612 omyj.exe 20 PID 2612 wrote to memory of 1160 2612 omyj.exe 20 PID 2612 wrote to memory of 1160 2612 omyj.exe 20 PID 2612 wrote to memory of 1488 2612 omyj.exe 25 PID 2612 wrote to memory of 1488 2612 omyj.exe 25 PID 2612 wrote to memory of 1488 2612 omyj.exe 25 PID 2612 wrote to memory of 1488 2612 omyj.exe 25 PID 2612 wrote to memory of 1488 2612 omyj.exe 25 PID 2612 wrote to memory of 2828 2612 omyj.exe 33 PID 2612 wrote to memory of 2828 2612 omyj.exe 33 PID 2612 wrote to memory of 2828 2612 omyj.exe 33 PID 2612 wrote to memory of 2828 2612 omyj.exe 33 PID 2612 wrote to memory of 2828 2612 omyj.exe 33 PID 2612 wrote to memory of 3052 2612 omyj.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1080
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1096
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb80f6136a793be7e64573325f247c0f_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Roaming\Ewyby\omyj.exe"C:\Users\Admin\AppData\Roaming\Ewyby\omyj.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Roaming\Ewyby\omyj.exe"C:\Users\Admin\AppData\Roaming\Ewyby\omyj.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpddad1c9a.bat"4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2828
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1488
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-421249724-2085143402-1559253382127652641267723699-768925043-2091624021350669577"1⤵PID:3052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5a969b5e49bbf4ad7ecb5dcd928d8ee43
SHA195a21d208b3434b53871fd19143d78fc40ee7c17
SHA256bca53d7eb13d298d562a0c8557e95fd35a050587515295034ff76dde33e74389
SHA5122ebf0dbe2fb77306c54ad9f025a8bdf118ab8981b3a0a49a8751393a72c4b21fe389f3fcbce7998367fd977942ac92b402da54a4fb3c481436141f54158787c8
-
Filesize
333KB
MD5613c5fd14a49c205c1f55bb139a5a96f
SHA156a98021be2c4eb44bda6246e7e6f331ae80d110
SHA2568046c46085780e05cb147b39e4376e6b03370c631e1b969d1dcf95411c04e087
SHA5123d74e751890dcc0985e27fd8957ad3045c96003a6aa42640b0c16d62d3f452866c35431037d83a0732bbb23212b26907938fd900b2cfafae6f63a1f600bda7fc