Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe
-
Size
327KB
-
MD5
0179143b053e9cfd1bef9f1010533012
-
SHA1
d8e24c24ae8d3041699c68f9ce05854852c07fa3
-
SHA256
da4426ff47d34467a485ba86db8e13c6bc90db0efade674835ddd8d06668442b
-
SHA512
6e3e33b6a0efdb7f4921aa8726f53d678054b666dd46e49a38ca7f2f5a2b947cfcdfbc844ccc5f944bb2d6721cabf68e290235dc39a84911bd34c0d243a51b08
-
SSDEEP
6144:d00NrmYDHTMu2WRBBHf2qVmEoJ2aWOCbuIpVfNCLcQP9en:d00NKYDoYhZVmdtWOCbuYacQO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2700 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1848 idarqy.exe 2600 idarqy.exe -
Loads dropped DLL 2 IoCs
pid Process 2900 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 2900 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D3EA3BE8-3C80-AD4F-223E-C0310034E32C} = "C:\\Users\\Admin\\AppData\\Roaming\\Irjo\\idarqy.exe" idarqy.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1864 set thread context of 2900 1864 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 30 PID 1848 set thread context of 2600 1848 idarqy.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idarqy.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Privacy cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe 2600 idarqy.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2900 1864 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2900 1864 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2900 1864 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2900 1864 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2900 1864 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2900 1864 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2900 1864 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2900 1864 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2900 1864 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 30 PID 2900 wrote to memory of 1848 2900 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 31 PID 2900 wrote to memory of 1848 2900 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 31 PID 2900 wrote to memory of 1848 2900 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 31 PID 2900 wrote to memory of 1848 2900 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 31 PID 1848 wrote to memory of 2600 1848 idarqy.exe 32 PID 1848 wrote to memory of 2600 1848 idarqy.exe 32 PID 1848 wrote to memory of 2600 1848 idarqy.exe 32 PID 1848 wrote to memory of 2600 1848 idarqy.exe 32 PID 1848 wrote to memory of 2600 1848 idarqy.exe 32 PID 1848 wrote to memory of 2600 1848 idarqy.exe 32 PID 1848 wrote to memory of 2600 1848 idarqy.exe 32 PID 1848 wrote to memory of 2600 1848 idarqy.exe 32 PID 1848 wrote to memory of 2600 1848 idarqy.exe 32 PID 2900 wrote to memory of 2700 2900 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 33 PID 2900 wrote to memory of 2700 2900 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 33 PID 2900 wrote to memory of 2700 2900 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 33 PID 2900 wrote to memory of 2700 2900 0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe 33 PID 2600 wrote to memory of 1044 2600 idarqy.exe 17 PID 2600 wrote to memory of 1044 2600 idarqy.exe 17 PID 2600 wrote to memory of 1044 2600 idarqy.exe 17 PID 2600 wrote to memory of 1044 2600 idarqy.exe 17 PID 2600 wrote to memory of 1044 2600 idarqy.exe 17 PID 2600 wrote to memory of 1068 2600 idarqy.exe 18 PID 2600 wrote to memory of 1068 2600 idarqy.exe 18 PID 2600 wrote to memory of 1068 2600 idarqy.exe 18 PID 2600 wrote to memory of 1068 2600 idarqy.exe 18 PID 2600 wrote to memory of 1068 2600 idarqy.exe 18 PID 2600 wrote to memory of 1128 2600 idarqy.exe 20 PID 2600 wrote to memory of 1128 2600 idarqy.exe 20 PID 2600 wrote to memory of 1128 2600 idarqy.exe 20 PID 2600 wrote to memory of 1128 2600 idarqy.exe 20 PID 2600 wrote to memory of 1128 2600 idarqy.exe 20 PID 2600 wrote to memory of 1996 2600 idarqy.exe 23 PID 2600 wrote to memory of 1996 2600 idarqy.exe 23 PID 2600 wrote to memory of 1996 2600 idarqy.exe 23 PID 2600 wrote to memory of 1996 2600 idarqy.exe 23 PID 2600 wrote to memory of 1996 2600 idarqy.exe 23 PID 2600 wrote to memory of 2700 2600 idarqy.exe 33 PID 2600 wrote to memory of 2700 2600 idarqy.exe 33 PID 2600 wrote to memory of 2700 2600 idarqy.exe 33 PID 2600 wrote to memory of 2700 2600 idarqy.exe 33 PID 2600 wrote to memory of 2700 2600 idarqy.exe 33 PID 2600 wrote to memory of 2772 2600 idarqy.exe 34 PID 2600 wrote to memory of 2772 2600 idarqy.exe 34 PID 2600 wrote to memory of 2772 2600 idarqy.exe 34 PID 2600 wrote to memory of 2772 2600 idarqy.exe 34 PID 2600 wrote to memory of 2772 2600 idarqy.exe 34
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1044
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1068
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0179143b053e9cfd1bef9f1010533012_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\Irjo\idarqy.exe"C:\Users\Admin\AppData\Roaming\Irjo\idarqy.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\Irjo\idarqy.exe"C:\Users\Admin\AppData\Roaming\Irjo\idarqy.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6724a44c.bat"4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2700
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1996
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1535875154545393133-462856394-1939856890-1944352967728850034-524358459-1154506341"1⤵PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5c7c0b2c6c9cf2fbedbc936f273c59e76
SHA17e1b90da8a68147afcae5761a134060e287ce7de
SHA256618ee2025c609ba5e979b54c7ab09380a6f61074147725c7b5bfe2347ca8c59b
SHA512390d07c666c4a6ace2f7332240faf66a26152cfef20cd483452014bf1364583ee8fe79b95a70ba6d9d8a3d10e7e1169566adbefd9e858b7808d666aabbc51cab
-
Filesize
327KB
MD52d40c13d069bb0f46c465eeae0908d59
SHA1d106e4106ec8ab3996c00f8ed42b5cc7b78dc7ea
SHA256db9c4c8cd55d02e671f1677482df510fe78cff0a4d7141fc59edce58f5213b09
SHA512d45a9c8fe4f21404e616b3d1cba951120ed3cf98c22657b387debc45bcc2c11075a550458bc96921fb057f81ab99b9f9863ad8e06ea61ed4b96be49aed80d1d1