Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 16:40

General

  • Target

    0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe

  • Size

    353KB

  • MD5

    0b9cabae983d7a2f301869512b6daf0a

  • SHA1

    42e86857e1907cc1ca5436cde4784a344d0a0b73

  • SHA256

    e51a571b3a0bc3c993d167e0efde407e377a604de1539b54b329e95b3b88aebc

  • SHA512

    280b884137081f2b8a79527a66db6e26136cf0e023234ce1d8aa795f950720a4e6cd4957b14f8f7826d81aa75e5cf922b9d435b72e530e44b226fa5f845759fa

  • SSDEEP

    6144:CDti6ZL6oBggU4QpML4apq/waiXIngkL1eiX+pvF6weWVua/G4:CBi6UoKgwpY4ac/MXIRpeiX+p8jWU4

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1224
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1332
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1372
          • C:\Users\Admin\AppData\Local\Temp\0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3060
            • C:\Users\Admin\AppData\Local\Temp\0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\0b9cabae983d7a2f301869512b6daf0a_JaffaCakes118.exe"
              3⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1124
              • C:\Users\Admin\AppData\Roaming\Ozox\yxen.exe
                "C:\Users\Admin\AppData\Roaming\Ozox\yxen.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2876
                • C:\Users\Admin\AppData\Roaming\Ozox\yxen.exe
                  "C:\Users\Admin\AppData\Roaming\Ozox\yxen.exe"
                  5⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2776
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp58c6841d.bat"
                4⤵
                • Deletes itself
                • System Location Discovery: System Language Discovery
                PID:2916
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1108

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmp58c6841d.bat

            Filesize

            271B

            MD5

            242bb46dd53a983fea58cdfcd1870518

            SHA1

            2edae079694a9e1b3c848ab5eb8b5d69aa05aca3

            SHA256

            66d28f422abb316078e818d9c6d464cf1ec4055272bc9057f21d258ce5a8785d

            SHA512

            a7e49110b185a702cd7565ddd2f0e0dae08b56be306fcb4b09e3b6b6850976918f6d5f8f692e54d65036096c87569c49ab6127202a1d3844bd40e77f16ef2ace

          • \Users\Admin\AppData\Roaming\Ozox\yxen.exe

            Filesize

            353KB

            MD5

            db3ee4ed75e00b398cfff18690f32d0a

            SHA1

            74d946f88fbac925803427181401ac1588f71615

            SHA256

            f8b41aa4cffaa8d73c268dbed0707486c5fdd2fd115b122328d5c519c3026506

            SHA512

            0e0e0f3583748dcc12c15bbcfa6866b8bde931c4230654b32ec10f6b43e2212331af742c75662e007135d6451030dbb542ee404930617adde3deaeec4c5a4836

          • memory/1108-67-0x0000000001C90000-0x0000000001CDC000-memory.dmp

            Filesize

            304KB

          • memory/1108-68-0x0000000001C90000-0x0000000001CDC000-memory.dmp

            Filesize

            304KB

          • memory/1108-69-0x0000000001C90000-0x0000000001CDC000-memory.dmp

            Filesize

            304KB

          • memory/1108-70-0x0000000001C90000-0x0000000001CDC000-memory.dmp

            Filesize

            304KB

          • memory/1124-3-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/1124-49-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/1124-15-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/1124-16-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/1124-17-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/1124-18-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/1124-5-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/1124-27-0x0000000000380000-0x00000000003DE000-memory.dmp

            Filesize

            376KB

          • memory/1124-1-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/1124-11-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/1124-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/1124-7-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/1224-55-0x0000000001D20000-0x0000000001D6C000-memory.dmp

            Filesize

            304KB

          • memory/1224-54-0x0000000001D20000-0x0000000001D6C000-memory.dmp

            Filesize

            304KB

          • memory/1224-52-0x0000000001D20000-0x0000000001D6C000-memory.dmp

            Filesize

            304KB

          • memory/1224-53-0x0000000001D20000-0x0000000001D6C000-memory.dmp

            Filesize

            304KB

          • memory/1332-57-0x0000000000120000-0x000000000016C000-memory.dmp

            Filesize

            304KB

          • memory/1332-58-0x0000000000120000-0x000000000016C000-memory.dmp

            Filesize

            304KB

          • memory/1332-59-0x0000000000120000-0x000000000016C000-memory.dmp

            Filesize

            304KB

          • memory/1332-60-0x0000000000120000-0x000000000016C000-memory.dmp

            Filesize

            304KB

          • memory/1372-64-0x0000000002690000-0x00000000026DC000-memory.dmp

            Filesize

            304KB

          • memory/1372-65-0x0000000002690000-0x00000000026DC000-memory.dmp

            Filesize

            304KB

          • memory/1372-62-0x0000000002690000-0x00000000026DC000-memory.dmp

            Filesize

            304KB

          • memory/1372-63-0x0000000002690000-0x00000000026DC000-memory.dmp

            Filesize

            304KB

          • memory/2776-79-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/2776-82-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/2776-50-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/2876-44-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/2916-75-0x00000000000F0000-0x000000000013C000-memory.dmp

            Filesize

            304KB

          • memory/2916-76-0x00000000000F0000-0x000000000013C000-memory.dmp

            Filesize

            304KB

          • memory/2916-74-0x00000000000F0000-0x000000000013C000-memory.dmp

            Filesize

            304KB

          • memory/2916-73-0x00000000000F0000-0x000000000013C000-memory.dmp

            Filesize

            304KB

          • memory/2916-72-0x00000000000F0000-0x000000000013C000-memory.dmp

            Filesize

            304KB

          • memory/3060-0-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/3060-13-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB