Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 23:07
Static task
static1
Behavioral task
behavioral1
Sample
07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe
-
Size
62KB
-
MD5
07cc657dc4216a6185d8f20dea6e0f37
-
SHA1
84ca2e56562bcfa5afbb21e868a5404863f206d2
-
SHA256
6e8a28115b0f36155aee7dee44e61ca9278cff3993f10fdfe0f328f5c7f7e3ea
-
SHA512
89a3ccd13da99cf8ce301cdd0478cad764cd940cf5e6393ebc109a00ea3aa32e9a86e50d94a1c822cbfff78d2b00d89ca652865394b144bbf131e60bda3d3de4
-
SSDEEP
1536:3MivkKldcHkM5g1In7dMO3TpZBK0t4KDFP14FMV:3MivkK1M58IBLSUP16M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2468 Utpxqewege.exe -
Loads dropped DLL 2 IoCs
pid Process 2472 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 2472 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Utpxqewege.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Utpxqewege.exe\"" 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Utpxqewege.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Utpxqewege.exe\"" 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\qjf09efoiejglkef = "‘šˆÒ‘" 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 2472 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 2472 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 2472 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 2472 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2472 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 2472 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe 2468 Utpxqewege.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2472 wrote to memory of 1208 2472 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 21 PID 2472 wrote to memory of 2468 2472 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 30 PID 2472 wrote to memory of 2468 2472 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 30 PID 2472 wrote to memory of 2468 2472 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 30 PID 2472 wrote to memory of 2468 2472 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 30 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 2472 2468 Utpxqewege.exe 29 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23 PID 2468 wrote to memory of 1108 2468 Utpxqewege.exe 19 PID 2468 wrote to memory of 1208 2468 Utpxqewege.exe 21 PID 2468 wrote to memory of 1300 2468 Utpxqewege.exe 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Roaming\Utpxqewege.exe"C:\Users\Admin\AppData\Roaming\Utpxqewege.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2468
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD507cc657dc4216a6185d8f20dea6e0f37
SHA184ca2e56562bcfa5afbb21e868a5404863f206d2
SHA2566e8a28115b0f36155aee7dee44e61ca9278cff3993f10fdfe0f328f5c7f7e3ea
SHA51289a3ccd13da99cf8ce301cdd0478cad764cd940cf5e6393ebc109a00ea3aa32e9a86e50d94a1c822cbfff78d2b00d89ca652865394b144bbf131e60bda3d3de4