Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 23:04
Static task
static1
Behavioral task
behavioral1
Sample
fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe
-
Size
361KB
-
MD5
fb1066d6880bbf1537b33f782dc60fda
-
SHA1
f7fb9c19790fde798946d15f1ce2582db676f6c4
-
SHA256
404b41a3e50690fe7a18020821e54858d492645b75605cd68db596e807ae5202
-
SHA512
b6bc6f07007149631cde620637ada2ac0364be51dd6bb9d42a043b4475f7cbf98d880c5097abcf412ae15453f2d75ee05c60c801facda02dfbc0c9165ed7f033
-
SSDEEP
6144:S586FJmmH7lnW2PRTTC0VRNhP0WsnxiP8Auit:wrPbIWBhVP1sno8rE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2324 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2760 emiz.exe -
Loads dropped DLL 2 IoCs
pid Process 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D95BC468-3C80-AD4F-F4E3-EFE6C1B1CCFB} = "C:\\Users\\Admin\\AppData\\Roaming\\Sewioc\\emiz.exe" emiz.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1728 set thread context of 2324 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emiz.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Privacy fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe 2760 emiz.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 2760 emiz.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2760 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2760 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2760 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2760 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 30 PID 2760 wrote to memory of 1060 2760 emiz.exe 18 PID 2760 wrote to memory of 1060 2760 emiz.exe 18 PID 2760 wrote to memory of 1060 2760 emiz.exe 18 PID 2760 wrote to memory of 1060 2760 emiz.exe 18 PID 2760 wrote to memory of 1060 2760 emiz.exe 18 PID 2760 wrote to memory of 1160 2760 emiz.exe 20 PID 2760 wrote to memory of 1160 2760 emiz.exe 20 PID 2760 wrote to memory of 1160 2760 emiz.exe 20 PID 2760 wrote to memory of 1160 2760 emiz.exe 20 PID 2760 wrote to memory of 1160 2760 emiz.exe 20 PID 2760 wrote to memory of 1184 2760 emiz.exe 21 PID 2760 wrote to memory of 1184 2760 emiz.exe 21 PID 2760 wrote to memory of 1184 2760 emiz.exe 21 PID 2760 wrote to memory of 1184 2760 emiz.exe 21 PID 2760 wrote to memory of 1184 2760 emiz.exe 21 PID 2760 wrote to memory of 1632 2760 emiz.exe 25 PID 2760 wrote to memory of 1632 2760 emiz.exe 25 PID 2760 wrote to memory of 1632 2760 emiz.exe 25 PID 2760 wrote to memory of 1632 2760 emiz.exe 25 PID 2760 wrote to memory of 1632 2760 emiz.exe 25 PID 2760 wrote to memory of 1728 2760 emiz.exe 29 PID 2760 wrote to memory of 1728 2760 emiz.exe 29 PID 2760 wrote to memory of 1728 2760 emiz.exe 29 PID 2760 wrote to memory of 1728 2760 emiz.exe 29 PID 2760 wrote to memory of 1728 2760 emiz.exe 29 PID 1728 wrote to memory of 2324 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 31 PID 1728 wrote to memory of 2324 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 31 PID 1728 wrote to memory of 2324 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 31 PID 1728 wrote to memory of 2324 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 31 PID 1728 wrote to memory of 2324 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 31 PID 1728 wrote to memory of 2324 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 31 PID 1728 wrote to memory of 2324 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 31 PID 1728 wrote to memory of 2324 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 31 PID 1728 wrote to memory of 2324 1728 fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe 31 PID 2760 wrote to memory of 1248 2760 emiz.exe 33 PID 2760 wrote to memory of 1248 2760 emiz.exe 33 PID 2760 wrote to memory of 1248 2760 emiz.exe 33 PID 2760 wrote to memory of 1248 2760 emiz.exe 33 PID 2760 wrote to memory of 1248 2760 emiz.exe 33
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1060
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Roaming\Sewioc\emiz.exe"C:\Users\Admin\AppData\Roaming\Sewioc\emiz.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2f724183.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2324
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1632
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5e91e212bc61340e64753a52349e8af7c
SHA1f1a0249b4a7657ecb1b22d44e0442aeb2020b069
SHA256154c76033b1eeec96db23f9624254fde408ac7647c20c2bffdb60f7a1ee9d0ff
SHA512c0aa69b23d2fa77d63f2ff2d5376c7a1b4d335dafb43d2165989840cd497fd09cdafbbc1b876e0e16ef1d13b5cc4ca455c9b2129736accab3fc477d3e1e02830
-
Filesize
361KB
MD5a91b2e924d7e0541746d3610d8397f7a
SHA15f20d5009acc30ea5b7fb62a68233a70da80a618
SHA256faa0b7c0f94bdd1ec29d62fd6dc8c624a8b58fb34ddd9e2aca73486f3c8f4800
SHA5121b07c8941874bb1b63c0273e25fbe494ba965df704133a8c68bca12116edc723482a042ee4bc9fd5bf21ef0994cc01f967cd68f6dac6993939a6568ee1af73eb