Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe
-
Size
298KB
-
MD5
12d2566eca8173d0e6ee0bf576ed140d
-
SHA1
5ff3709bd7717732b1744635991b5229464171ac
-
SHA256
743b782db3d90fd1e18f440b21eb8254ec8cf7a68df9871ee1977c2f5b1706c1
-
SHA512
a8d691c6df29eddca69ee1d8490baf3c93a1cf11a782dc9050ffea168630de0b6d623d1e2ccf6e63e309105adeb0b55ea4abae5779ec5c5df52dfb1ecd9ee823
-
SSDEEP
3072:/tpe7RlPXDomWqLEnCYvcvIXRTy1hmUI0xlOcw6IvS3oGcFuG9hFoHk148GzMwS2:D4RX8vDx8hzNxl86IvSiFxTO8GzM+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2916 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1312 poyxp.exe -
Loads dropped DLL 1 IoCs
pid Process 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\{15320D28-6FEE-AD4F-3AAA-40C7281D63DA} = "C:\\Users\\Admin\\AppData\\Roaming\\Ecdof\\poyxp.exe" poyxp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2396 set thread context of 2916 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language poyxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Privacy 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe 1312 poyxp.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 1312 poyxp.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1312 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1312 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1312 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1312 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 30 PID 1312 wrote to memory of 1112 1312 poyxp.exe 19 PID 1312 wrote to memory of 1112 1312 poyxp.exe 19 PID 1312 wrote to memory of 1112 1312 poyxp.exe 19 PID 1312 wrote to memory of 1112 1312 poyxp.exe 19 PID 1312 wrote to memory of 1112 1312 poyxp.exe 19 PID 1312 wrote to memory of 1164 1312 poyxp.exe 20 PID 1312 wrote to memory of 1164 1312 poyxp.exe 20 PID 1312 wrote to memory of 1164 1312 poyxp.exe 20 PID 1312 wrote to memory of 1164 1312 poyxp.exe 20 PID 1312 wrote to memory of 1164 1312 poyxp.exe 20 PID 1312 wrote to memory of 1200 1312 poyxp.exe 21 PID 1312 wrote to memory of 1200 1312 poyxp.exe 21 PID 1312 wrote to memory of 1200 1312 poyxp.exe 21 PID 1312 wrote to memory of 1200 1312 poyxp.exe 21 PID 1312 wrote to memory of 1200 1312 poyxp.exe 21 PID 1312 wrote to memory of 336 1312 poyxp.exe 25 PID 1312 wrote to memory of 336 1312 poyxp.exe 25 PID 1312 wrote to memory of 336 1312 poyxp.exe 25 PID 1312 wrote to memory of 336 1312 poyxp.exe 25 PID 1312 wrote to memory of 336 1312 poyxp.exe 25 PID 1312 wrote to memory of 2396 1312 poyxp.exe 29 PID 1312 wrote to memory of 2396 1312 poyxp.exe 29 PID 1312 wrote to memory of 2396 1312 poyxp.exe 29 PID 1312 wrote to memory of 2396 1312 poyxp.exe 29 PID 1312 wrote to memory of 2396 1312 poyxp.exe 29 PID 2396 wrote to memory of 2916 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 31 PID 2396 wrote to memory of 2916 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 31 PID 2396 wrote to memory of 2916 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 31 PID 2396 wrote to memory of 2916 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 31 PID 2396 wrote to memory of 2916 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 31 PID 2396 wrote to memory of 2916 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 31 PID 2396 wrote to memory of 2916 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 31 PID 2396 wrote to memory of 2916 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 31 PID 2396 wrote to memory of 2916 2396 12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12d2566eca8173d0e6ee0bf576ed140d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Roaming\Ecdof\poyxp.exe"C:\Users\Admin\AppData\Roaming\Ecdof\poyxp.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1312
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf6ed5c9d.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2916
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5fb4f7bb6f5aa7416d7a6b39f5fa2c53d
SHA1731fefdc3806b14dfc2d7af2cc13cebd1de5497c
SHA25662f964777ce086307c379af66f7abbe3d0efd4505974708a0eb05666542d780f
SHA512fd42ec61bec4f6221c2857132a022597627bf7ae4e05ad0353929388e981f3e5622deba5a629c1d55d79c4c02a1349a3d6224db779996667f1d05dbd1f16b598
-
Filesize
298KB
MD52963cdbd5881aaa9f9703300e09f4215
SHA1f82b9597933b2f1b5097315dfbee335bb6b827a5
SHA2562aa8f55f87f45e8f4d08cf06f5592af6de53c79ed4803d3d6cf32bf03805dbea
SHA512b0fde1967acdbad63609d41a72e287fc361c4a75f0287ca7ae437adfcc3320e4c48b5e3e0b83d7abdc4c7e597c210d1ef6c4cce83648978e053982a02c151f29