Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 19:50
Static task
static1
Behavioral task
behavioral1
Sample
14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe
-
Size
188KB
-
MD5
14b7649a52f7192cc47b3c6848763d62
-
SHA1
8db772be994e79818e67a247ba6b143f82071545
-
SHA256
88850ceb48f96140e0f925bb8b758cd7daa2e566ea1f1d248895fdf82241d847
-
SHA512
8ee8b02bc995900ede2592e17503d68476d9b6e63899e941cbd494c0919d7ebf907b6f4e4bf393abced28e3e8bf5ddf31983463fa3e90a23f92161765b03ba29
-
SSDEEP
3072:fEJXTtgD6db1teDy9VusR1enuYbcrBLCfEgloIvDaNtEmidLPUduKkf0eA6z:8J5geztee9FR1eTboMM7IeDz7ksY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2912 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2296 caocao.exe 2108 qiuqiu.exe -
Loads dropped DLL 9 IoCs
pid Process 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 2296 caocao.exe 2296 caocao.exe 2296 caocao.exe 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 2108 qiuqiu.exe 2108 qiuqiu.exe 2108 qiuqiu.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\qiuqi1.bat 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe File created C:\Program Files\Common Files\caocao.exe 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe File created C:\Program Files\Common Files\qiuqi1.dll 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caocao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qiuqiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1}\InProcServer32 qiuqiu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID qiuqiu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1} qiuqiu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1}\InProcServer32\ = "C:\\Program Files\\Common Files\\qiuqi1.dll" qiuqiu.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2296 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2296 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2296 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2296 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2296 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2296 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2296 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2108 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 32 PID 2824 wrote to memory of 2108 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 32 PID 2824 wrote to memory of 2108 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 32 PID 2824 wrote to memory of 2108 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 32 PID 2824 wrote to memory of 2108 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 32 PID 2824 wrote to memory of 2108 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 32 PID 2824 wrote to memory of 2108 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 32 PID 2108 wrote to memory of 2924 2108 qiuqiu.exe 33 PID 2108 wrote to memory of 2924 2108 qiuqiu.exe 33 PID 2108 wrote to memory of 2924 2108 qiuqiu.exe 33 PID 2108 wrote to memory of 2924 2108 qiuqiu.exe 33 PID 2108 wrote to memory of 2924 2108 qiuqiu.exe 33 PID 2108 wrote to memory of 2924 2108 qiuqiu.exe 33 PID 2108 wrote to memory of 2924 2108 qiuqiu.exe 33 PID 2824 wrote to memory of 2912 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 35 PID 2824 wrote to memory of 2912 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 35 PID 2824 wrote to memory of 2912 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 35 PID 2824 wrote to memory of 2912 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 35 PID 2824 wrote to memory of 2912 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 35 PID 2824 wrote to memory of 2912 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 35 PID 2824 wrote to memory of 2912 2824 14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14b7649a52f7192cc47b3c6848763d62_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files\Common Files\caocao.exe"C:\Program Files\Common Files\caocao.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Documents and Settings\qiuqiu.exe"C:\Documents and Settings\qiuqiu.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\DOCUME~1\qiuqiu.exe3⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del C:\Users\Admin\AppData\Local\Temp\14B764~1.EXE2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.0MB
MD5e02c004d342074c20b4b6b6e87726338
SHA10c502d2c0e8c59bf20f40dd353b19bd2b34e066a
SHA25616e2279d6e4e07957b2daefc11358d14819bc6d085f80bdb0110ea8fb186b122
SHA51288722f33f42d917989bb0b0855540dd3fe033aba4be0fac6929b571ced37e1248caceceb465f90e1bf29a5ca1a496fb492e7db575b48c9f961ffbc62997799d9
-
Filesize
24.0MB
MD502523b3aef9fde7905f1853dd0bf31c6
SHA1d08d465b9217860af1034df74b559a4d7c47c382
SHA256d53160db51106c5abb0d3ef1267eeffe6251e5f3ac24e4a8b7033dcec1144ece
SHA512665a2614ce258deac6ad3adf6cf33790fafc239cf92921a5f790c2f89719bda43ead9ce77d4896ba543154a126fa6cfb21ed13baa145256dcf67bcaff26a9e97