Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe
-
Size
18KB
-
MD5
edd49c94e4b8af4197cebdef16db1c47
-
SHA1
34e28916827122e4e34c5d1fe6014137b35f9798
-
SHA256
22ef0fc7b07788143eac54a8da40ad4d576ee70934120db5d1ed87c2c6c519f0
-
SHA512
927fce05315f8b160ec4b7f4c5684e9939db13d9b053d12d8cbf42713d449fac753bfc4f529b1a0bf529bf8ffc855f3d78dfa6bb619ff01f14925aff440f4ea5
-
SSDEEP
384:B3ihkJoR/Edf4ONy+W2bW+GGUvTbS1MEUaNJawcudoD7UNh:BiWxy+TgHXcJnbcuyD7UN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" coiome.exe -
Deletes itself 1 IoCs
pid Process 2912 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2416 coiome.exe -
Loads dropped DLL 2 IoCs
pid Process 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\safe360 = "C:\\Program Files\\Common Files\\sfbsbvy\\coiome.exe" mshta.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe File created C:\Program Files (x86)\TIT.hta edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy coiome.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1640 sc.exe 1796 sc.exe 2952 sc.exe 1668 sc.exe 2104 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coiome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 3 IoCs
pid Process 2576 taskkill.exe 944 taskkill.exe 752 taskkill.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.2345.com/?kkkbaidu" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\default_page_url = "http://www.2345.com/?kkkbaidu" mshta.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?kkkbaidu" mshta.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe Token: SeDebugPrivilege 2576 taskkill.exe Token: SeDebugPrivilege 2416 coiome.exe Token: SeDebugPrivilege 944 taskkill.exe Token: SeDebugPrivilege 752 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2300 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 30 PID 1708 wrote to memory of 2300 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 30 PID 1708 wrote to memory of 2300 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 30 PID 1708 wrote to memory of 2300 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 30 PID 1708 wrote to memory of 2644 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 31 PID 1708 wrote to memory of 2644 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 31 PID 1708 wrote to memory of 2644 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 31 PID 1708 wrote to memory of 2644 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 31 PID 2644 wrote to memory of 2576 2644 cmd.exe 33 PID 2644 wrote to memory of 2576 2644 cmd.exe 33 PID 2644 wrote to memory of 2576 2644 cmd.exe 33 PID 2644 wrote to memory of 2576 2644 cmd.exe 33 PID 1708 wrote to memory of 2416 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 35 PID 1708 wrote to memory of 2416 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 35 PID 1708 wrote to memory of 2416 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 35 PID 1708 wrote to memory of 2416 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 35 PID 1708 wrote to memory of 2912 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 36 PID 1708 wrote to memory of 2912 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 36 PID 1708 wrote to memory of 2912 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 36 PID 1708 wrote to memory of 2912 1708 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 36 PID 2416 wrote to memory of 2164 2416 coiome.exe 39 PID 2416 wrote to memory of 2164 2416 coiome.exe 39 PID 2416 wrote to memory of 2164 2416 coiome.exe 39 PID 2416 wrote to memory of 2164 2416 coiome.exe 39 PID 2416 wrote to memory of 1272 2416 coiome.exe 40 PID 2416 wrote to memory of 1272 2416 coiome.exe 40 PID 2416 wrote to memory of 1272 2416 coiome.exe 40 PID 2416 wrote to memory of 1272 2416 coiome.exe 40 PID 1272 wrote to memory of 944 1272 cmd.exe 43 PID 1272 wrote to memory of 944 1272 cmd.exe 43 PID 1272 wrote to memory of 944 1272 cmd.exe 43 PID 1272 wrote to memory of 944 1272 cmd.exe 43 PID 2164 wrote to memory of 1640 2164 cmd.exe 44 PID 2164 wrote to memory of 1640 2164 cmd.exe 44 PID 2164 wrote to memory of 1640 2164 cmd.exe 44 PID 2164 wrote to memory of 1640 2164 cmd.exe 44 PID 2416 wrote to memory of 1584 2416 coiome.exe 45 PID 2416 wrote to memory of 1584 2416 coiome.exe 45 PID 2416 wrote to memory of 1584 2416 coiome.exe 45 PID 2416 wrote to memory of 1584 2416 coiome.exe 45 PID 1584 wrote to memory of 752 1584 cmd.exe 47 PID 1584 wrote to memory of 752 1584 cmd.exe 47 PID 1584 wrote to memory of 752 1584 cmd.exe 47 PID 1584 wrote to memory of 752 1584 cmd.exe 47 PID 2416 wrote to memory of 328 2416 coiome.exe 48 PID 2416 wrote to memory of 328 2416 coiome.exe 48 PID 2416 wrote to memory of 328 2416 coiome.exe 48 PID 2416 wrote to memory of 328 2416 coiome.exe 48 PID 328 wrote to memory of 1796 328 cmd.exe 50 PID 328 wrote to memory of 1796 328 cmd.exe 50 PID 328 wrote to memory of 1796 328 cmd.exe 50 PID 328 wrote to memory of 1796 328 cmd.exe 50 PID 2416 wrote to memory of 1648 2416 coiome.exe 51 PID 2416 wrote to memory of 1648 2416 coiome.exe 51 PID 2416 wrote to memory of 1648 2416 coiome.exe 51 PID 2416 wrote to memory of 1648 2416 coiome.exe 51 PID 2416 wrote to memory of 2396 2416 coiome.exe 53 PID 2416 wrote to memory of 2396 2416 coiome.exe 53 PID 2416 wrote to memory of 2396 2416 coiome.exe 53 PID 2416 wrote to memory of 2396 2416 coiome.exe 53 PID 1648 wrote to memory of 344 1648 cmd.exe 54 PID 1648 wrote to memory of 344 1648 cmd.exe 54 PID 1648 wrote to memory of 344 1648 cmd.exe 54 PID 1648 wrote to memory of 344 1648 cmd.exe 54 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 344 attrib.exe 1724 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Program Files (x86)\TIT.hta"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:2300
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im coiome.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im coiome.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
-
C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe"C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.execmd /c sc delete JavaServe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\sc.exesc delete JavaServe4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1640
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im iejore.exe /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im iejore.exe /f4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im conime.exe /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im conime.exe /f4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc stop LYTC3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\sc.exesc stop LYTC4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Cookies\*.*"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:344
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete LYTC3⤵
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\SysWOW64\sc.exesc delete LYTC4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Local Settings\Temp\Cookies\*.*"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Cookies\*.*3⤵
- System Location Discovery: System Language Discovery
PID:2100
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc stop HidServ3⤵
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\sc.exesc stop HidServ4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temporary Internet Files\*.*"3⤵
- System Location Discovery: System Language Discovery
PID:2000
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete HidServ3⤵
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\SysWOW64\sc.exesc delete HidServ4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2104
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Documents and Settings\All Users\Application Data\Storm\update\%SESSIONNAME%\*.* /e /p everyone:n3⤵
- System Location Discovery: System Language Discovery
PID:1332 -
C:\Windows\SysWOW64\cacls.execacls C:\Documents and Settings\All Users\Application Data\Storm\update\Console\*.* /e /p everyone:n4⤵
- System Location Discovery: System Language Discovery
PID:1048
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Indicator Removal
1File Deletion
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
785B
MD574ccbce1e5800180a01fb299767e310c
SHA15eee44303a3800e0ac31a103538dccfe4ffa57b2
SHA2567c800551aa79c34f689c2d87e3b24c2bfaca0d2815538650abe445c3cb3a77ec
SHA512581385678a72de017f99b41d565d5acd8b2ffa322e20ae9489803b6043fe6696ccab38c43ae5583afda73cb3f33b4fa33813c543ffb4e34b17394d1ec6fae6c8
-
Filesize
2.0MB
MD56e90b312459b8b262081b7a5bbd9123b
SHA11d9f9fa5d3b498cb9719340b00ee838a9bec50bb
SHA256908b33e35f53d67b116d1103edc7cf7e3e52d087c9884f94ec9d4f2374415af1
SHA512e205b660a6f30932822ba013ed8c8c0b9006fb3a3c43f213b1b875fade5fd3b3eb9adec2b1a8e24793a1f7e6b49cf1bf78778b2497565874bb87792d855355ca