Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 23:16
Static task
static1
Behavioral task
behavioral1
Sample
ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe
-
Size
290KB
-
MD5
ff79c6553d3fb7689cf472984effcc5b
-
SHA1
ef1baa26d59fe7ad47c60bb3e83fbc9eb05abfc1
-
SHA256
7f32fa75d05a74d9447a347f89bcb149befbab9f6e1d3bb36de1ab29a24ab5fb
-
SHA512
c5f588d4994184acc100351c6dafeb1aeaf0f3e227ad53479f785be0cf352c2a75624c2af6a373d128e2df68061d1aa987be4972f5c95ae927a927faec9a72fe
-
SSDEEP
6144:2fsOV09Du+Rc9DMQtc9LMojzmx1i68NbP67pkkDvarPdYLx3IhpD:KX2C9DGh1wi6APephDvoY13QpD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2896 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1904 numi.exe -
Loads dropped DLL 2 IoCs
pid Process 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\{09E0E5E8-6808-AD4F-43B0-714965AC5254} = "C:\\Users\\Admin\\AppData\\Roaming\\Ehlix\\numi.exe" numi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1976 set thread context of 2896 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language numi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Privacy ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe 1904 numi.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe Token: SeSecurityPrivilege 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe Token: SeSecurityPrivilege 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 1904 numi.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1904 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 30 PID 1976 wrote to memory of 1904 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 30 PID 1976 wrote to memory of 1904 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 30 PID 1976 wrote to memory of 1904 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 30 PID 1904 wrote to memory of 1080 1904 numi.exe 18 PID 1904 wrote to memory of 1080 1904 numi.exe 18 PID 1904 wrote to memory of 1080 1904 numi.exe 18 PID 1904 wrote to memory of 1080 1904 numi.exe 18 PID 1904 wrote to memory of 1080 1904 numi.exe 18 PID 1904 wrote to memory of 1156 1904 numi.exe 20 PID 1904 wrote to memory of 1156 1904 numi.exe 20 PID 1904 wrote to memory of 1156 1904 numi.exe 20 PID 1904 wrote to memory of 1156 1904 numi.exe 20 PID 1904 wrote to memory of 1156 1904 numi.exe 20 PID 1904 wrote to memory of 1200 1904 numi.exe 21 PID 1904 wrote to memory of 1200 1904 numi.exe 21 PID 1904 wrote to memory of 1200 1904 numi.exe 21 PID 1904 wrote to memory of 1200 1904 numi.exe 21 PID 1904 wrote to memory of 1200 1904 numi.exe 21 PID 1904 wrote to memory of 288 1904 numi.exe 25 PID 1904 wrote to memory of 288 1904 numi.exe 25 PID 1904 wrote to memory of 288 1904 numi.exe 25 PID 1904 wrote to memory of 288 1904 numi.exe 25 PID 1904 wrote to memory of 288 1904 numi.exe 25 PID 1904 wrote to memory of 1976 1904 numi.exe 29 PID 1904 wrote to memory of 1976 1904 numi.exe 29 PID 1904 wrote to memory of 1976 1904 numi.exe 29 PID 1904 wrote to memory of 1976 1904 numi.exe 29 PID 1904 wrote to memory of 1976 1904 numi.exe 29 PID 1976 wrote to memory of 2896 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2896 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2896 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2896 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2896 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2896 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2896 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2896 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2896 1976 ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1080
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff79c6553d3fb7689cf472984effcc5b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\Ehlix\numi.exe"C:\Users\Admin\AppData\Roaming\Ehlix\numi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpaa2087b9.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD59e9be3de64d5decf5cab7b3d3099bfa2
SHA16baef8177f87f24821c155df0109f6bde2e43ba8
SHA256c5a2278fd4fcb28bc9eb8a03b748ad5de539e59133a87a04184406d97e801ad6
SHA512e21fee20b8146a5a9a9cd00bb077c4f87015b56aa3d55b44366b7e089488650c3b19c723c4f94d18a0ff9ccec4c0325202ec5398df422596c016a1fca1debeb3
-
Filesize
380B
MD56614467b8d4980d279715ea1512ccb7f
SHA11e0ca7ac8bfebb296c2ce4c0337e055d31da9bd6
SHA25660364cc48dcd211b930886fe891e0a26a49b47e17afd5e949f46a3bfdd5b902f
SHA512bf6a2d51ae554bdfe2745b302d7c75137a532849aa4be3c38e8b8182427152e75178cbc7f94187e8514ed43715a710a8f4186d108169e43389d260645e26566f
-
Filesize
290KB
MD5589449378cc027582170b7080c34ce61
SHA1f396a13b767698b51ce28947ed7819cecc3dacc6
SHA256fd50010636af6b23cd7a966461f74fdb3032e180a767bd949447c9d1bf656ce0
SHA512edb10790c2e1105736cb069b46a359d8c178d4e41cefe059dd784f57951c362ce79bf1d539497643f0ea7a6c29c1188529e7892b66fd35fc6ee84060486dfa17