Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
26cbdcf90cc17c2f484304607bc5f304
-
SHA1
1543209ad50bb99664350f93440026093e56cf30
-
SHA256
e5165924d99fe61170addb988706af806acda9329e209c3bfb76bd81396c2d19
-
SHA512
b5bd5341127333248e8f47c86e61e617e8017500188d0d8553ae437e8cd60855050789392ff5d69b2da28c8e1ed6d672cfaabf67d1fbab5f7eac6e1f95fb9f90
-
SSDEEP
24576:llNK7zqNMQnNrdZomkksEmdczMf5/m5I40paHmW5pP0wY:ll7Nv3PaILSWl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2828 U1r5fQVi.exe -
Executes dropped EXE 2 IoCs
pid Process 2724 U1r5fQVi.exe 2828 U1r5fQVi.exe -
Loads dropped DLL 4 IoCs
pid Process 2160 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe 2160 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe 2160 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe 2828 U1r5fQVi.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\0KTeYqCeObM6JX = "C:\\ProgramData\\IkPhyoEQ\\U1r5fQVi.exe" 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2924 set thread context of 2160 2924 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe 30 PID 2724 set thread context of 2828 2724 U1r5fQVi.exe 32 PID 2828 set thread context of 2580 2828 U1r5fQVi.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U1r5fQVi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U1r5fQVi.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2160 2924 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2160 2924 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2160 2924 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2160 2924 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2160 2924 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2160 2924 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2724 2160 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe 31 PID 2160 wrote to memory of 2724 2160 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe 31 PID 2160 wrote to memory of 2724 2160 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe 31 PID 2160 wrote to memory of 2724 2160 26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe 31 PID 2724 wrote to memory of 2828 2724 U1r5fQVi.exe 32 PID 2724 wrote to memory of 2828 2724 U1r5fQVi.exe 32 PID 2724 wrote to memory of 2828 2724 U1r5fQVi.exe 32 PID 2724 wrote to memory of 2828 2724 U1r5fQVi.exe 32 PID 2724 wrote to memory of 2828 2724 U1r5fQVi.exe 32 PID 2724 wrote to memory of 2828 2724 U1r5fQVi.exe 32 PID 2828 wrote to memory of 2580 2828 U1r5fQVi.exe 33 PID 2828 wrote to memory of 2580 2828 U1r5fQVi.exe 33 PID 2828 wrote to memory of 2580 2828 U1r5fQVi.exe 33 PID 2828 wrote to memory of 2580 2828 U1r5fQVi.exe 33 PID 2828 wrote to memory of 2580 2828 U1r5fQVi.exe 33 PID 2828 wrote to memory of 2580 2828 U1r5fQVi.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26cbdcf90cc17c2f484304607bc5f304_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\ProgramData\IkPhyoEQ\U1r5fQVi.exe"C:\ProgramData\IkPhyoEQ\U1r5fQVi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\ProgramData\IkPhyoEQ\U1r5fQVi.exe"C:\ProgramData\IkPhyoEQ\U1r5fQVi.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Windows Sidebar\sidebar.exe"C:\Program Files (x86)\Windows Sidebar\sidebar.exe" /i:28285⤵PID:2580
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD526cbdcf90cc17c2f484304607bc5f304
SHA11543209ad50bb99664350f93440026093e56cf30
SHA256e5165924d99fe61170addb988706af806acda9329e209c3bfb76bd81396c2d19
SHA512b5bd5341127333248e8f47c86e61e617e8017500188d0d8553ae437e8cd60855050789392ff5d69b2da28c8e1ed6d672cfaabf67d1fbab5f7eac6e1f95fb9f90