Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe
-
Size
18KB
-
MD5
edd49c94e4b8af4197cebdef16db1c47
-
SHA1
34e28916827122e4e34c5d1fe6014137b35f9798
-
SHA256
22ef0fc7b07788143eac54a8da40ad4d576ee70934120db5d1ed87c2c6c519f0
-
SHA512
927fce05315f8b160ec4b7f4c5684e9939db13d9b053d12d8cbf42713d449fac753bfc4f529b1a0bf529bf8ffc855f3d78dfa6bb619ff01f14925aff440f4ea5
-
SSDEEP
384:B3ihkJoR/Edf4ONy+W2bW+GGUvTbS1MEUaNJawcudoD7UNh:BiWxy+TgHXcJnbcuyD7UN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" coiome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1048 coiome.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\safe360 = "C:\\Program Files\\Common Files\\sfbsbvy\\coiome.exe" mshta.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy coiome.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe File created C:\Program Files (x86)\GFG.hta edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4728 sc.exe 1556 sc.exe 3460 sc.exe 2796 sc.exe 3468 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coiome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 3 IoCs
pid Process 2404 taskkill.exe 5096 taskkill.exe 3152 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.2345.com/?kkkbaidu" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Main\default_page_url = "http://www.2345.com/?kkkbaidu" mshta.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?kkkbaidu" mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4128 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe Token: SeDebugPrivilege 2404 taskkill.exe Token: SeDebugPrivilege 1048 coiome.exe Token: SeDebugPrivilege 5096 taskkill.exe Token: SeDebugPrivilege 3152 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4128 wrote to memory of 3520 4128 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 82 PID 4128 wrote to memory of 3520 4128 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 82 PID 4128 wrote to memory of 3520 4128 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 82 PID 4128 wrote to memory of 5032 4128 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 83 PID 4128 wrote to memory of 5032 4128 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 83 PID 4128 wrote to memory of 5032 4128 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 83 PID 5032 wrote to memory of 2404 5032 cmd.exe 85 PID 5032 wrote to memory of 2404 5032 cmd.exe 85 PID 5032 wrote to memory of 2404 5032 cmd.exe 85 PID 4128 wrote to memory of 1048 4128 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 93 PID 4128 wrote to memory of 1048 4128 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 93 PID 4128 wrote to memory of 1048 4128 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 93 PID 4128 wrote to memory of 1756 4128 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 94 PID 4128 wrote to memory of 1756 4128 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 94 PID 4128 wrote to memory of 1756 4128 edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe 94 PID 1048 wrote to memory of 244 1048 coiome.exe 96 PID 1048 wrote to memory of 244 1048 coiome.exe 96 PID 1048 wrote to memory of 244 1048 coiome.exe 96 PID 1048 wrote to memory of 3124 1048 coiome.exe 97 PID 1048 wrote to memory of 3124 1048 coiome.exe 97 PID 1048 wrote to memory of 3124 1048 coiome.exe 97 PID 3124 wrote to memory of 5096 3124 cmd.exe 100 PID 3124 wrote to memory of 5096 3124 cmd.exe 100 PID 3124 wrote to memory of 5096 3124 cmd.exe 100 PID 244 wrote to memory of 2796 244 cmd.exe 101 PID 244 wrote to memory of 2796 244 cmd.exe 101 PID 244 wrote to memory of 2796 244 cmd.exe 101 PID 1048 wrote to memory of 4724 1048 coiome.exe 102 PID 1048 wrote to memory of 4724 1048 coiome.exe 102 PID 1048 wrote to memory of 4724 1048 coiome.exe 102 PID 4724 wrote to memory of 3152 4724 cmd.exe 104 PID 4724 wrote to memory of 3152 4724 cmd.exe 104 PID 4724 wrote to memory of 3152 4724 cmd.exe 104 PID 1048 wrote to memory of 3068 1048 coiome.exe 105 PID 1048 wrote to memory of 3068 1048 coiome.exe 105 PID 1048 wrote to memory of 3068 1048 coiome.exe 105 PID 3068 wrote to memory of 3468 3068 cmd.exe 107 PID 3068 wrote to memory of 3468 3068 cmd.exe 107 PID 3068 wrote to memory of 3468 3068 cmd.exe 107 PID 1048 wrote to memory of 4912 1048 coiome.exe 108 PID 1048 wrote to memory of 4912 1048 coiome.exe 108 PID 1048 wrote to memory of 4912 1048 coiome.exe 108 PID 1048 wrote to memory of 4776 1048 coiome.exe 110 PID 1048 wrote to memory of 4776 1048 coiome.exe 110 PID 1048 wrote to memory of 4776 1048 coiome.exe 110 PID 4912 wrote to memory of 748 4912 cmd.exe 112 PID 4912 wrote to memory of 748 4912 cmd.exe 112 PID 4912 wrote to memory of 748 4912 cmd.exe 112 PID 4776 wrote to memory of 4728 4776 cmd.exe 113 PID 4776 wrote to memory of 4728 4776 cmd.exe 113 PID 4776 wrote to memory of 4728 4776 cmd.exe 113 PID 1048 wrote to memory of 3980 1048 coiome.exe 114 PID 1048 wrote to memory of 3980 1048 coiome.exe 114 PID 1048 wrote to memory of 3980 1048 coiome.exe 114 PID 3980 wrote to memory of 344 3980 cmd.exe 116 PID 3980 wrote to memory of 344 3980 cmd.exe 116 PID 3980 wrote to memory of 344 3980 cmd.exe 116 PID 1048 wrote to memory of 3920 1048 coiome.exe 117 PID 1048 wrote to memory of 3920 1048 coiome.exe 117 PID 1048 wrote to memory of 3920 1048 coiome.exe 117 PID 1048 wrote to memory of 536 1048 coiome.exe 119 PID 1048 wrote to memory of 536 1048 coiome.exe 119 PID 1048 wrote to memory of 536 1048 coiome.exe 119 PID 536 wrote to memory of 1556 536 cmd.exe 121 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 748 attrib.exe 344 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Program Files (x86)\GFG.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:3520
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im coiome.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im coiome.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
-
C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe"C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd /c sc delete JavaServe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\SysWOW64\sc.exesc delete JavaServe4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im iejore.exe /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im iejore.exe /f4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im conime.exe /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im conime.exe /f4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc stop LYTC3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\sc.exesc stop LYTC4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3468
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Cookies\*.*"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete LYTC3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\sc.exesc delete LYTC4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4728
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Local Settings\Temp\Cookies\*.*"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:344
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Cookies\*.*3⤵
- System Location Discovery: System Language Discovery
PID:3920
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc stop HidServ3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\sc.exesc stop HidServ4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temporary Internet Files\*.*"3⤵
- System Location Discovery: System Language Discovery
PID:3516
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete HidServ3⤵
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\sc.exesc delete HidServ4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3460
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
PID:1988
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Documents and Settings\All Users\Application Data\Storm\update\%SESSIONNAME%\*.* /e /p everyone:n3⤵
- System Location Discovery: System Language Discovery
PID:3444 -
C:\Windows\SysWOW64\cacls.execacls C:\Documents and Settings\All Users\Application Data\Storm\update\Console\*.* /e /p everyone:n4⤵
- System Location Discovery: System Language Discovery
PID:2320
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\edd49c94e4b8af4197cebdef16db1c47_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Indicator Removal
1File Deletion
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD50616eab56666f242184ef474b47af7d5
SHA1dc137353e027fd33acff4e75b4330f76c7a659d2
SHA2568c632863566699a087671bd1ebeb487319f0529ba9e2ddad72cde517303bb58a
SHA512352d3259a235f3d3d6975663b0165f58d8535db36f946e2aa6970d33f93ff65454bf58c4cd118cb4a9bf95c3f94c48dc6b7a7a61d20d74677efbe78929239ff5
-
Filesize
785B
MD574ccbce1e5800180a01fb299767e310c
SHA15eee44303a3800e0ac31a103538dccfe4ffa57b2
SHA2567c800551aa79c34f689c2d87e3b24c2bfaca0d2815538650abe445c3cb3a77ec
SHA512581385678a72de017f99b41d565d5acd8b2ffa322e20ae9489803b6043fe6696ccab38c43ae5583afda73cb3f33b4fa33813c543ffb4e34b17394d1ec6fae6c8