Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe
-
Size
361KB
-
MD5
f6166cdc0a097e10128d4de973add6e1
-
SHA1
f000eee5390658f073be3c562dac06da540e5ea3
-
SHA256
1dc49260ddb0dafb9ed33f897077de15f8f1611d3c667c5ab31f80be68244bd2
-
SHA512
0605469a2b157326deb9f153218bf0fa3b36eb4c7e19a07e212c0dc81fe977779644e4b3c70de115f37501d90ca1272992f7f0a1573702ae90bc876979df59e9
-
SSDEEP
6144:p86yxJmmxlnW2PRTTC0VRNhPpWsnxiP8AukSC:poPxIWBhVPIsno8rkT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2000 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2676 zoon.exe -
Loads dropped DLL 2 IoCs
pid Process 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D95D62C8-3C80-AD4F-B5A1-F2FF8485D1E2} = "C:\\Users\\Admin\\AppData\\Roaming\\Moagk\\zoon.exe" zoon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2924 set thread context of 2000 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zoon.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Privacy f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe 2676 zoon.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 2676 zoon.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2676 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2676 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2676 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2676 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 30 PID 2676 wrote to memory of 1108 2676 zoon.exe 19 PID 2676 wrote to memory of 1108 2676 zoon.exe 19 PID 2676 wrote to memory of 1108 2676 zoon.exe 19 PID 2676 wrote to memory of 1108 2676 zoon.exe 19 PID 2676 wrote to memory of 1108 2676 zoon.exe 19 PID 2676 wrote to memory of 1156 2676 zoon.exe 20 PID 2676 wrote to memory of 1156 2676 zoon.exe 20 PID 2676 wrote to memory of 1156 2676 zoon.exe 20 PID 2676 wrote to memory of 1156 2676 zoon.exe 20 PID 2676 wrote to memory of 1156 2676 zoon.exe 20 PID 2676 wrote to memory of 1184 2676 zoon.exe 21 PID 2676 wrote to memory of 1184 2676 zoon.exe 21 PID 2676 wrote to memory of 1184 2676 zoon.exe 21 PID 2676 wrote to memory of 1184 2676 zoon.exe 21 PID 2676 wrote to memory of 1184 2676 zoon.exe 21 PID 2676 wrote to memory of 2032 2676 zoon.exe 23 PID 2676 wrote to memory of 2032 2676 zoon.exe 23 PID 2676 wrote to memory of 2032 2676 zoon.exe 23 PID 2676 wrote to memory of 2032 2676 zoon.exe 23 PID 2676 wrote to memory of 2032 2676 zoon.exe 23 PID 2676 wrote to memory of 2924 2676 zoon.exe 29 PID 2676 wrote to memory of 2924 2676 zoon.exe 29 PID 2676 wrote to memory of 2924 2676 zoon.exe 29 PID 2676 wrote to memory of 2924 2676 zoon.exe 29 PID 2676 wrote to memory of 2924 2676 zoon.exe 29 PID 2924 wrote to memory of 2000 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 31 PID 2924 wrote to memory of 2000 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 31 PID 2924 wrote to memory of 2000 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 31 PID 2924 wrote to memory of 2000 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 31 PID 2924 wrote to memory of 2000 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 31 PID 2924 wrote to memory of 2000 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 31 PID 2924 wrote to memory of 2000 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 31 PID 2924 wrote to memory of 2000 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 31 PID 2924 wrote to memory of 2000 2924 f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2056 2676 zoon.exe 34 PID 2676 wrote to memory of 2056 2676 zoon.exe 34 PID 2676 wrote to memory of 2056 2676 zoon.exe 34 PID 2676 wrote to memory of 2056 2676 zoon.exe 34 PID 2676 wrote to memory of 2056 2676 zoon.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6166cdc0a097e10128d4de973add6e1_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Roaming\Moagk\zoon.exe"C:\Users\Admin\AppData\Roaming\Moagk\zoon.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp29dd20e9.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2000
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2032
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5f372347d0822321974ab809f7c1e61d5
SHA1086127ecb0c7d0ef2784a3a90463098d036b4358
SHA2565a935198dfc0c96c9869e3b4e0f0aa7cb23a0f79c81cc84af12219d898434a34
SHA512eb6a524d194cd030c81eda77b90793d831cadaf3653a2ce5b119b6c1ca00f3d62cfdad79c6f6634df204235ed8407348bd4050f79cfa5c817c30717e0884d699
-
Filesize
361KB
MD55f3b97ce9844847c91e2ecc62db4ce96
SHA183ab9e126096f4aa1204a7d498e2f899b3a54c74
SHA2566637f7b923a2c35de926f9e147d6e0c135feb055b07ced289fecf02bbf6d4b51
SHA51252531bc38d6255463f906b56839b6eaa32858f69c04add6ed46a681c2170bf356f3c7576f088f7b5b929ddc5afcae6181e87249e7017bde1414c82141fbc9c24