Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 23:20
Static task
static1
Behavioral task
behavioral1
Sample
fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe
-
Size
148KB
-
MD5
fb15ecb4fefb5c02553904d8590395a2
-
SHA1
cfb33face734c27230250c903701ac169580e785
-
SHA256
f95af3e23bda0620d7191b8fc2e8e5a28d69b1079d1ee2d839b08c11a260b0ae
-
SHA512
f4ed1996652c7cf5e8f72b24d19a1b73172e384c7063a656fc041c82691e4519e245b43c1c7d617ca46c19c170301dfba06d387477b487538bfc372e9bdb7471
-
SSDEEP
3072:TiIugaY4CiAeB1NIkSzW7ucOF1HDkYte+rxfgDVrxQDan/:8pnAeVIVaurFpWDV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2448 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2840 itbas.exe -
Loads dropped DLL 2 IoCs
pid Process 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\{0ED8CBC3-17E5-2B50-08ED-9901781717E0} = "C:\\Users\\Admin\\AppData\\Roaming\\Ikavke\\itbas.exe" itbas.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2280 set thread context of 2448 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itbas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Privacy fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe 2840 itbas.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe Token: SeSecurityPrivilege 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe Token: SeSecurityPrivilege 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2840 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 31 PID 2280 wrote to memory of 2840 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 31 PID 2280 wrote to memory of 2840 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 31 PID 2280 wrote to memory of 2840 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 31 PID 2840 wrote to memory of 1116 2840 itbas.exe 19 PID 2840 wrote to memory of 1116 2840 itbas.exe 19 PID 2840 wrote to memory of 1116 2840 itbas.exe 19 PID 2840 wrote to memory of 1116 2840 itbas.exe 19 PID 2840 wrote to memory of 1116 2840 itbas.exe 19 PID 2840 wrote to memory of 1168 2840 itbas.exe 20 PID 2840 wrote to memory of 1168 2840 itbas.exe 20 PID 2840 wrote to memory of 1168 2840 itbas.exe 20 PID 2840 wrote to memory of 1168 2840 itbas.exe 20 PID 2840 wrote to memory of 1168 2840 itbas.exe 20 PID 2840 wrote to memory of 1224 2840 itbas.exe 21 PID 2840 wrote to memory of 1224 2840 itbas.exe 21 PID 2840 wrote to memory of 1224 2840 itbas.exe 21 PID 2840 wrote to memory of 1224 2840 itbas.exe 21 PID 2840 wrote to memory of 1224 2840 itbas.exe 21 PID 2840 wrote to memory of 1336 2840 itbas.exe 23 PID 2840 wrote to memory of 1336 2840 itbas.exe 23 PID 2840 wrote to memory of 1336 2840 itbas.exe 23 PID 2840 wrote to memory of 1336 2840 itbas.exe 23 PID 2840 wrote to memory of 1336 2840 itbas.exe 23 PID 2840 wrote to memory of 2280 2840 itbas.exe 30 PID 2840 wrote to memory of 2280 2840 itbas.exe 30 PID 2840 wrote to memory of 2280 2840 itbas.exe 30 PID 2840 wrote to memory of 2280 2840 itbas.exe 30 PID 2840 wrote to memory of 2280 2840 itbas.exe 30 PID 2280 wrote to memory of 2448 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 32 PID 2280 wrote to memory of 2448 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 32 PID 2280 wrote to memory of 2448 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 32 PID 2280 wrote to memory of 2448 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 32 PID 2280 wrote to memory of 2448 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 32 PID 2280 wrote to memory of 2448 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 32 PID 2280 wrote to memory of 2448 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 32 PID 2280 wrote to memory of 2448 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 32 PID 2280 wrote to memory of 2448 2280 fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe 32 PID 2840 wrote to memory of 992 2840 itbas.exe 34 PID 2840 wrote to memory of 992 2840 itbas.exe 34 PID 2840 wrote to memory of 992 2840 itbas.exe 34 PID 2840 wrote to memory of 992 2840 itbas.exe 34 PID 2840 wrote to memory of 992 2840 itbas.exe 34 PID 2840 wrote to memory of 2764 2840 itbas.exe 35 PID 2840 wrote to memory of 2764 2840 itbas.exe 35 PID 2840 wrote to memory of 2764 2840 itbas.exe 35 PID 2840 wrote to memory of 2764 2840 itbas.exe 35 PID 2840 wrote to memory of 2764 2840 itbas.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb15ecb4fefb5c02553904d8590395a2_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Roaming\Ikavke\itbas.exe"C:\Users\Admin\AppData\Roaming\Ikavke\itbas.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6bc9d271.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2448
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1336
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:992
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5aec9ea48d5142de886ec52f089ca14d4
SHA195bc06c686285734be8bb0aa60a1e5f8c43a3839
SHA256c1422bc3c7545e06edbb8010d8bb9b3d28d1438c61ce1084b1ab0101dbeb954f
SHA512b8572ed7fa79db3adf303f963dd9ecf5f0f5cc97a110e28d8e1dc2b2a58dc2718ef2661893ffc9c4abd3434c8d815163ff28c0f7999053636303ff36d0cd0f3d
-
Filesize
380B
MD52f2ee34d87f70703d8d10b3d22d3012c
SHA1427da08f99860fbdfa49de422ace666a153dc71a
SHA25690a2a3e312eb3b386e2146d8524fa46c9ef194a20c3f28d05f20361c6e26272b
SHA51249567fbce7e42301a4d39daacf65cc348c2a9c3d270aef16d950955be3e9f57d40d8e80630635f98f1f66260016fad26b971eb8d7bcd17bc910a397c95765d76
-
Filesize
148KB
MD5e474645cb6cd0b7bfc45c939bf2d99b9
SHA16a6deff10287406faed023a1c41ccb068db3e87a
SHA2568b3144355c78328fc25af242025fbde20b75ceda2c785f325c297346c1b9dfac
SHA5127526950639fc768aa1fbba2c349db69ca4fde3ae7abcfeb6ac338f6a788c92fd475641fbe3b8f3f021972962bf29f9b4dadf5d715baa918b29ed1177c20afe4c