Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 23:04

General

  • Target

    fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe

  • Size

    361KB

  • MD5

    fb1066d6880bbf1537b33f782dc60fda

  • SHA1

    f7fb9c19790fde798946d15f1ce2582db676f6c4

  • SHA256

    404b41a3e50690fe7a18020821e54858d492645b75605cd68db596e807ae5202

  • SHA512

    b6bc6f07007149631cde620637ada2ac0364be51dd6bb9d42a043b4475f7cbf98d880c5097abcf412ae15453f2d75ee05c60c801facda02dfbc0c9165ed7f033

  • SSDEEP

    6144:S586FJmmH7lnW2PRTTC0VRNhP0WsnxiP8Auit:wrPbIWBhVP1sno8rE

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1060
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1160
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1184
          • C:\Users\Admin\AppData\Local\Temp\fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\fb1066d6880bbf1537b33f782dc60fda_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:1728
            • C:\Users\Admin\AppData\Roaming\Sewioc\emiz.exe
              "C:\Users\Admin\AppData\Roaming\Sewioc\emiz.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2760
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2f724183.bat"
              3⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:2324
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1632
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1248

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\tmp2f724183.bat

              Filesize

              271B

              MD5

              e91e212bc61340e64753a52349e8af7c

              SHA1

              f1a0249b4a7657ecb1b22d44e0442aeb2020b069

              SHA256

              154c76033b1eeec96db23f9624254fde408ac7647c20c2bffdb60f7a1ee9d0ff

              SHA512

              c0aa69b23d2fa77d63f2ff2d5376c7a1b4d335dafb43d2165989840cd497fd09cdafbbc1b876e0e16ef1d13b5cc4ca455c9b2129736accab3fc477d3e1e02830

            • \Users\Admin\AppData\Roaming\Sewioc\emiz.exe

              Filesize

              361KB

              MD5

              a91b2e924d7e0541746d3610d8397f7a

              SHA1

              5f20d5009acc30ea5b7fb62a68233a70da80a618

              SHA256

              faa0b7c0f94bdd1ec29d62fd6dc8c624a8b58fb34ddd9e2aca73486f3c8f4800

              SHA512

              1b07c8941874bb1b63c0273e25fbe494ba965df704133a8c68bca12116edc723482a042ee4bc9fd5bf21ef0994cc01f967cd68f6dac6993939a6568ee1af73eb

            • memory/1060-26-0x0000000002120000-0x0000000002164000-memory.dmp

              Filesize

              272KB

            • memory/1060-20-0x0000000002120000-0x0000000002164000-memory.dmp

              Filesize

              272KB

            • memory/1060-18-0x0000000002120000-0x0000000002164000-memory.dmp

              Filesize

              272KB

            • memory/1060-22-0x0000000002120000-0x0000000002164000-memory.dmp

              Filesize

              272KB

            • memory/1060-24-0x0000000002120000-0x0000000002164000-memory.dmp

              Filesize

              272KB

            • memory/1160-31-0x0000000001FE0000-0x0000000002024000-memory.dmp

              Filesize

              272KB

            • memory/1160-29-0x0000000001FE0000-0x0000000002024000-memory.dmp

              Filesize

              272KB

            • memory/1160-33-0x0000000001FE0000-0x0000000002024000-memory.dmp

              Filesize

              272KB

            • memory/1160-34-0x0000000001FE0000-0x0000000002024000-memory.dmp

              Filesize

              272KB

            • memory/1184-39-0x0000000002500000-0x0000000002544000-memory.dmp

              Filesize

              272KB

            • memory/1184-36-0x0000000002500000-0x0000000002544000-memory.dmp

              Filesize

              272KB

            • memory/1184-37-0x0000000002500000-0x0000000002544000-memory.dmp

              Filesize

              272KB

            • memory/1184-38-0x0000000002500000-0x0000000002544000-memory.dmp

              Filesize

              272KB

            • memory/1632-42-0x0000000001F40000-0x0000000001F84000-memory.dmp

              Filesize

              272KB

            • memory/1632-41-0x0000000001F40000-0x0000000001F84000-memory.dmp

              Filesize

              272KB

            • memory/1632-43-0x0000000001F40000-0x0000000001F84000-memory.dmp

              Filesize

              272KB

            • memory/1632-44-0x0000000001F40000-0x0000000001F84000-memory.dmp

              Filesize

              272KB

            • memory/1728-137-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-48-0x00000000005E0000-0x0000000000624000-memory.dmp

              Filesize

              272KB

            • memory/1728-66-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-64-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-62-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-60-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-58-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-56-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-54-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-52-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-51-0x00000000005E0000-0x0000000000624000-memory.dmp

              Filesize

              272KB

            • memory/1728-162-0x00000000005E0000-0x0000000000624000-memory.dmp

              Filesize

              272KB

            • memory/1728-70-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-161-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1728-160-0x0000000000470000-0x00000000004D2000-memory.dmp

              Filesize

              392KB

            • memory/1728-50-0x00000000005E0000-0x0000000000624000-memory.dmp

              Filesize

              272KB

            • memory/1728-49-0x00000000005E0000-0x0000000000624000-memory.dmp

              Filesize

              272KB

            • memory/1728-68-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-72-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-74-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-76-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-135-0x00000000005E0000-0x0000000000624000-memory.dmp

              Filesize

              272KB

            • memory/1728-136-0x0000000077900000-0x0000000077901000-memory.dmp

              Filesize

              4KB

            • memory/1728-2-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1728-78-0x0000000000450000-0x0000000000451000-memory.dmp

              Filesize

              4KB

            • memory/1728-1-0x0000000000470000-0x00000000004D2000-memory.dmp

              Filesize

              392KB

            • memory/1728-47-0x00000000005E0000-0x0000000000624000-memory.dmp

              Filesize

              272KB

            • memory/1728-0-0x0000000000270000-0x00000000002B4000-memory.dmp

              Filesize

              272KB

            • memory/1728-3-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1728-4-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1728-5-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2760-15-0x0000000000400000-0x0000000000462000-memory.dmp

              Filesize

              392KB

            • memory/2760-16-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2760-284-0x0000000000400000-0x0000000000462000-memory.dmp

              Filesize

              392KB

            • memory/2760-285-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB