Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe
-
Size
98KB
-
MD5
0aa8fb62abfbb62ec43076dd164d8751
-
SHA1
597819616e16889167bc74372127f6eb62193212
-
SHA256
96429043f3a30c01b205e2da6599782a864822dfb07b3cb016986c6e65a12ca5
-
SHA512
ad6d9fdaf53afd2a2023fa0aca81e7f2fe9c3caaf249504505c8c6b7345312cd5e100663e9783d8d415aceded4be967079c0db5fb9b1bbbca0fd673e3cb21461
-
SSDEEP
1536:rIcnFivCOLJVj7hH+sONVP/XtVtxGOBA+rRhCkQskMHUjO7pVE/AJe31ryelqa4K:rrsJHO3dnxxfrRh7QPMRa/AJKsNARFd
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2868 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
qhel.exeqhel.exepid process 2220 qhel.exe 2192 qhel.exe -
Loads dropped DLL 2 IoCs
Processes:
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exeqhel.exepid process 2404 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 2220 qhel.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\qhel.exe\" /r" 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exeqhel.exeqhel.exedescription pid process target process PID 2124 set thread context of 2404 2124 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2220 set thread context of 2192 2220 qhel.exe qhel.exe PID 2192 set thread context of 2836 2192 qhel.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exeqhel.exeqhel.exesvchost.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qhel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qhel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exeqhel.exeqhel.exedescription pid process target process PID 2124 wrote to memory of 2404 2124 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2124 wrote to memory of 2404 2124 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2124 wrote to memory of 2404 2124 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2124 wrote to memory of 2404 2124 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2124 wrote to memory of 2404 2124 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2124 wrote to memory of 2404 2124 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2124 wrote to memory of 2404 2124 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2124 wrote to memory of 2404 2124 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2124 wrote to memory of 2404 2124 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2404 wrote to memory of 2220 2404 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe qhel.exe PID 2404 wrote to memory of 2220 2404 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe qhel.exe PID 2404 wrote to memory of 2220 2404 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe qhel.exe PID 2404 wrote to memory of 2220 2404 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe qhel.exe PID 2220 wrote to memory of 2192 2220 qhel.exe qhel.exe PID 2220 wrote to memory of 2192 2220 qhel.exe qhel.exe PID 2220 wrote to memory of 2192 2220 qhel.exe qhel.exe PID 2220 wrote to memory of 2192 2220 qhel.exe qhel.exe PID 2220 wrote to memory of 2192 2220 qhel.exe qhel.exe PID 2220 wrote to memory of 2192 2220 qhel.exe qhel.exe PID 2220 wrote to memory of 2192 2220 qhel.exe qhel.exe PID 2220 wrote to memory of 2192 2220 qhel.exe qhel.exe PID 2220 wrote to memory of 2192 2220 qhel.exe qhel.exe PID 2192 wrote to memory of 2836 2192 qhel.exe svchost.exe PID 2192 wrote to memory of 2836 2192 qhel.exe svchost.exe PID 2192 wrote to memory of 2836 2192 qhel.exe svchost.exe PID 2192 wrote to memory of 2836 2192 qhel.exe svchost.exe PID 2192 wrote to memory of 2836 2192 qhel.exe svchost.exe PID 2192 wrote to memory of 2836 2192 qhel.exe svchost.exe PID 2404 wrote to memory of 2868 2404 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe cmd.exe PID 2404 wrote to memory of 2868 2404 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe cmd.exe PID 2404 wrote to memory of 2868 2404 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe cmd.exe PID 2404 wrote to memory of 2868 2404 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\qhel.exe"C:\Users\Admin\qhel.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\qhel.exe"C:\Users\Admin\qhel.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4003.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD561bfeeb438fd19c602653cc8f1ae584d
SHA1542ad13a588d96dd5d57582746dfd98c64311c16
SHA256831c590b0b044160db45645686c5459a23bdf935c0e989aae896fb9e54f80279
SHA5123b6f6419bcbf79086773354fba9cb5e96c6d7e41d7e14a2c5bd2a7909ebcaf60b4dbf09946b0f127c313b2a6e65e7e8369cc1c0bfa6f103ee995eba610f9afc2
-
Filesize
98KB
MD50aa8fb62abfbb62ec43076dd164d8751
SHA1597819616e16889167bc74372127f6eb62193212
SHA25696429043f3a30c01b205e2da6599782a864822dfb07b3cb016986c6e65a12ca5
SHA512ad6d9fdaf53afd2a2023fa0aca81e7f2fe9c3caaf249504505c8c6b7345312cd5e100663e9783d8d415aceded4be967079c0db5fb9b1bbbca0fd673e3cb21461