Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 11:43
Behavioral task
behavioral1
Sample
f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe
-
Size
297KB
-
MD5
f5efbee9d2ec391369463f54d305aceb
-
SHA1
7e34efc45141a017cbf4c8e1a2080bae289ad67f
-
SHA256
e1045c48554afe84cffcf7cbcd26f435269d6f419bb9255a71f39e50bc2c3a2e
-
SHA512
950f65471ac9174aa8706854f86f1501c1ec9bad5c0f00e6742bab9720e02c7694694093e9808c9bfa7a760d235c998332e367372ebec5ce07bf3bd3863a7ce9
-
SSDEEP
6144:Pch5remK3mpw027zTuHDVlVKD+YhGlaSGExpYG6YKJcVpZCO3lljh:85rdNpw0EyOTgoSGExC4KJIjh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2500 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1396 yghu.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D2BEAD48-3C80-AD4F-FE01-FCCCDCDBDFD1} = "C:\\Users\\Admin\\AppData\\Roaming\\Ehjee\\yghu.exe" yghu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3040 set thread context of 2500 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 32 -
resource yara_rule behavioral1/memory/3040-0-0x0000000000400000-0x00000000007FF000-memory.dmp upx behavioral1/files/0x0009000000016276-12.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Privacy f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe 1396 yghu.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe Token: SeSecurityPrivilege 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe Token: SeSecurityPrivilege 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3040 wrote to memory of 1396 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 30 PID 3040 wrote to memory of 1396 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 30 PID 3040 wrote to memory of 1396 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 30 PID 3040 wrote to memory of 1396 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 30 PID 1396 wrote to memory of 1112 1396 yghu.exe 19 PID 1396 wrote to memory of 1112 1396 yghu.exe 19 PID 1396 wrote to memory of 1112 1396 yghu.exe 19 PID 1396 wrote to memory of 1112 1396 yghu.exe 19 PID 1396 wrote to memory of 1112 1396 yghu.exe 19 PID 1396 wrote to memory of 1164 1396 yghu.exe 20 PID 1396 wrote to memory of 1164 1396 yghu.exe 20 PID 1396 wrote to memory of 1164 1396 yghu.exe 20 PID 1396 wrote to memory of 1164 1396 yghu.exe 20 PID 1396 wrote to memory of 1164 1396 yghu.exe 20 PID 1396 wrote to memory of 1192 1396 yghu.exe 21 PID 1396 wrote to memory of 1192 1396 yghu.exe 21 PID 1396 wrote to memory of 1192 1396 yghu.exe 21 PID 1396 wrote to memory of 1192 1396 yghu.exe 21 PID 1396 wrote to memory of 1192 1396 yghu.exe 21 PID 1396 wrote to memory of 2036 1396 yghu.exe 23 PID 1396 wrote to memory of 2036 1396 yghu.exe 23 PID 1396 wrote to memory of 2036 1396 yghu.exe 23 PID 1396 wrote to memory of 2036 1396 yghu.exe 23 PID 1396 wrote to memory of 2036 1396 yghu.exe 23 PID 1396 wrote to memory of 3040 1396 yghu.exe 29 PID 1396 wrote to memory of 3040 1396 yghu.exe 29 PID 1396 wrote to memory of 3040 1396 yghu.exe 29 PID 1396 wrote to memory of 3040 1396 yghu.exe 29 PID 1396 wrote to memory of 3040 1396 yghu.exe 29 PID 3040 wrote to memory of 2500 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 32 PID 3040 wrote to memory of 2500 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 32 PID 3040 wrote to memory of 2500 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 32 PID 3040 wrote to memory of 2500 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 32 PID 3040 wrote to memory of 2500 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 32 PID 3040 wrote to memory of 2500 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 32 PID 3040 wrote to memory of 2500 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 32 PID 3040 wrote to memory of 2500 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 32 PID 3040 wrote to memory of 2500 3040 f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5efbee9d2ec391369463f54d305aceb_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Roaming\Ehjee\yghu.exe"C:\Users\Admin\AppData\Roaming\Ehjee\yghu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1396
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa4979993.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2500
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5dae8a749e9e9561e2f11f8dac4a47405
SHA1e14b09c8fab745bc673bfbf57161f6669396f740
SHA256f4504c37903dfecb151a61b8005df2e9d8b0ebf5ce6178f59fc316a7ffbe945f
SHA5127ab280cba9e3a93ce9688e80b2a76206888b4b13ca29e2cbd268b9ca59f2e71b8141b41615ab427703c4f1f11fffbd71a4f4bd8228154e1f57907899d67862b4
-
Filesize
297KB
MD5400a674da7f1354553364797d0ed53d3
SHA1f9c0a473e1fefd99651cd51e963764983547ad04
SHA256fef7e5346408eed39a24f2bd406c769789015e568dd71a3cfc0ae3f3dc4c2770
SHA51269e9073dc6f6e465d5b35da7c77ec8981b17dbd1a47d0a46aaaa56feb83cb3ad020524e68ff2af7af78bc635076879ba4a6124f6827d44961a56257a8282447d
-
Filesize
380B
MD55c52613eeb027aedb1032eb4deca99ca
SHA19aae31349c9670edf3688161e58cbac5fd132877
SHA256a839c7847c5c826343f91b96ff30d8ee92de12485846fb482de577f47bd96930
SHA51225c007c45eba78395d313ef47fc93c27d80860c1f6670f531b307b734991a1f83488fce7f5f41870e75790f2efacad166e05c780609b7e3c92c6ff49a81168c3