Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe
-
Size
353KB
-
MD5
0b9cabae983d7a2f301869512b6daf0a
-
SHA1
42e86857e1907cc1ca5436cde4784a344d0a0b73
-
SHA256
e51a571b3a0bc3c993d167e0efde407e377a604de1539b54b329e95b3b88aebc
-
SHA512
280b884137081f2b8a79527a66db6e26136cf0e023234ce1d8aa795f950720a4e6cd4957b14f8f7826d81aa75e5cf922b9d435b72e530e44b226fa5f845759fa
-
SSDEEP
6144:CDti6ZL6oBggU4QpML4apq/waiXIngkL1eiX+pvF6weWVua/G4:CBi6UoKgwpY4ac/MXIRpeiX+p8jWU4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2916 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2876 yxen.exe 2776 yxen.exe -
Loads dropped DLL 2 IoCs
pid Process 1124 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 1124 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\{ED60B7C8-3C80-AD4F-2955-D827011AFB3A} = "C:\\Users\\Admin\\AppData\\Roaming\\Ozox\\yxen.exe" yxen.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3060 set thread context of 1124 3060 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 29 PID 2876 set thread context of 2776 2876 yxen.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe 2776 yxen.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 3060 wrote to memory of 1124 3060 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 29 PID 3060 wrote to memory of 1124 3060 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 29 PID 3060 wrote to memory of 1124 3060 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 29 PID 3060 wrote to memory of 1124 3060 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 29 PID 3060 wrote to memory of 1124 3060 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 29 PID 3060 wrote to memory of 1124 3060 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 29 PID 3060 wrote to memory of 1124 3060 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 29 PID 3060 wrote to memory of 1124 3060 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 29 PID 3060 wrote to memory of 1124 3060 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 29 PID 1124 wrote to memory of 2876 1124 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 30 PID 1124 wrote to memory of 2876 1124 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 30 PID 1124 wrote to memory of 2876 1124 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 30 PID 1124 wrote to memory of 2876 1124 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2776 2876 yxen.exe 31 PID 2876 wrote to memory of 2776 2876 yxen.exe 31 PID 2876 wrote to memory of 2776 2876 yxen.exe 31 PID 2876 wrote to memory of 2776 2876 yxen.exe 31 PID 2876 wrote to memory of 2776 2876 yxen.exe 31 PID 2876 wrote to memory of 2776 2876 yxen.exe 31 PID 2876 wrote to memory of 2776 2876 yxen.exe 31 PID 2876 wrote to memory of 2776 2876 yxen.exe 31 PID 2876 wrote to memory of 2776 2876 yxen.exe 31 PID 1124 wrote to memory of 2916 1124 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 32 PID 1124 wrote to memory of 2916 1124 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 32 PID 1124 wrote to memory of 2916 1124 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 32 PID 1124 wrote to memory of 2916 1124 0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe 32 PID 2776 wrote to memory of 1224 2776 yxen.exe 18 PID 2776 wrote to memory of 1224 2776 yxen.exe 18 PID 2776 wrote to memory of 1224 2776 yxen.exe 18 PID 2776 wrote to memory of 1224 2776 yxen.exe 18 PID 2776 wrote to memory of 1224 2776 yxen.exe 18 PID 2776 wrote to memory of 1332 2776 yxen.exe 19 PID 2776 wrote to memory of 1332 2776 yxen.exe 19 PID 2776 wrote to memory of 1332 2776 yxen.exe 19 PID 2776 wrote to memory of 1332 2776 yxen.exe 19 PID 2776 wrote to memory of 1332 2776 yxen.exe 19 PID 2776 wrote to memory of 1372 2776 yxen.exe 20 PID 2776 wrote to memory of 1372 2776 yxen.exe 20 PID 2776 wrote to memory of 1372 2776 yxen.exe 20 PID 2776 wrote to memory of 1372 2776 yxen.exe 20 PID 2776 wrote to memory of 1372 2776 yxen.exe 20 PID 2776 wrote to memory of 1108 2776 yxen.exe 22 PID 2776 wrote to memory of 1108 2776 yxen.exe 22 PID 2776 wrote to memory of 1108 2776 yxen.exe 22 PID 2776 wrote to memory of 1108 2776 yxen.exe 22 PID 2776 wrote to memory of 1108 2776 yxen.exe 22 PID 2776 wrote to memory of 2916 2776 yxen.exe 32 PID 2776 wrote to memory of 2916 2776 yxen.exe 32 PID 2776 wrote to memory of 2916 2776 yxen.exe 32 PID 2776 wrote to memory of 2916 2776 yxen.exe 32 PID 2776 wrote to memory of 2916 2776 yxen.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1224
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1332
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Roaming\Ozox\yxen.exe"C:\Users\Admin\AppData\Roaming\Ozox\yxen.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Roaming\Ozox\yxen.exe"C:\Users\Admin\AppData\Roaming\Ozox\yxen.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp58c6841d.bat"4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2916
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5242bb46dd53a983fea58cdfcd1870518
SHA12edae079694a9e1b3c848ab5eb8b5d69aa05aca3
SHA25666d28f422abb316078e818d9c6d464cf1ec4055272bc9057f21d258ce5a8785d
SHA512a7e49110b185a702cd7565ddd2f0e0dae08b56be306fcb4b09e3b6b6850976918f6d5f8f692e54d65036096c87569c49ab6127202a1d3844bd40e77f16ef2ace
-
Filesize
353KB
MD5db3ee4ed75e00b398cfff18690f32d0a
SHA174d946f88fbac925803427181401ac1588f71615
SHA256f8b41aa4cffaa8d73c268dbed0707486c5fdd2fd115b122328d5c519c3026506
SHA5120e0e0f3583748dcc12c15bbcfa6866b8bde931c4230654b32ec10f6b43e2212331af742c75662e007135d6451030dbb542ee404930617adde3deaeec4c5a4836