Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 07:44
Static task
static1
Behavioral task
behavioral1
Sample
2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe
-
Size
307KB
-
MD5
2d6ce39f767b49e1d5bceb890648d6b3
-
SHA1
148956022a03a8cf2feda7fb2c8505f2f1fa2499
-
SHA256
da57845221a9928e67dc4e07421155470ec87c5d824cc941cd23d386de337569
-
SHA512
ff7d80a59315cc0f9ef752025a03721d1d78c3d89edcbffef9849cad98361b3660c643ac13b10bc67e0628b3c811aebe53154c7189a34dc7c23d76ac58e03ba4
-
SSDEEP
6144:HkSzlT72Y0SuzinYKTY1SQshfRPVQe1MZkIYSccr7wbstOEPECYeixlYGiciM:HkqJ7SS5YsY1UMqMZJYSN7wbstOE8fvZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 276 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2812 yzvuvy.exe -
Loads dropped DLL 1 IoCs
pid Process 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D9E5F948-3C80-AD4F-E7F9-6BD2C10548CF} = "C:\\Users\\Admin\\AppData\\Roaming\\Geve\\yzvuvy.exe" yzvuvy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 764 set thread context of 276 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yzvuvy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Privacy 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe 2812 yzvuvy.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 764 wrote to memory of 2812 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe 31 PID 764 wrote to memory of 2812 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe 31 PID 764 wrote to memory of 2812 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe 31 PID 764 wrote to memory of 2812 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe 31 PID 2812 wrote to memory of 1072 2812 yzvuvy.exe 18 PID 2812 wrote to memory of 1072 2812 yzvuvy.exe 18 PID 2812 wrote to memory of 1072 2812 yzvuvy.exe 18 PID 2812 wrote to memory of 1072 2812 yzvuvy.exe 18 PID 2812 wrote to memory of 1072 2812 yzvuvy.exe 18 PID 2812 wrote to memory of 1132 2812 yzvuvy.exe 19 PID 2812 wrote to memory of 1132 2812 yzvuvy.exe 19 PID 2812 wrote to memory of 1132 2812 yzvuvy.exe 19 PID 2812 wrote to memory of 1132 2812 yzvuvy.exe 19 PID 2812 wrote to memory of 1132 2812 yzvuvy.exe 19 PID 2812 wrote to memory of 1196 2812 yzvuvy.exe 21 PID 2812 wrote to memory of 1196 2812 yzvuvy.exe 21 PID 2812 wrote to memory of 1196 2812 yzvuvy.exe 21 PID 2812 wrote to memory of 1196 2812 yzvuvy.exe 21 PID 2812 wrote to memory of 1196 2812 yzvuvy.exe 21 PID 2812 wrote to memory of 280 2812 yzvuvy.exe 25 PID 2812 wrote to memory of 280 2812 yzvuvy.exe 25 PID 2812 wrote to memory of 280 2812 yzvuvy.exe 25 PID 2812 wrote to memory of 280 2812 yzvuvy.exe 25 PID 2812 wrote to memory of 280 2812 yzvuvy.exe 25 PID 2812 wrote to memory of 764 2812 yzvuvy.exe 30 PID 2812 wrote to memory of 764 2812 yzvuvy.exe 30 PID 2812 wrote to memory of 764 2812 yzvuvy.exe 30 PID 2812 wrote to memory of 764 2812 yzvuvy.exe 30 PID 2812 wrote to memory of 764 2812 yzvuvy.exe 30 PID 764 wrote to memory of 276 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe 32 PID 764 wrote to memory of 276 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe 32 PID 764 wrote to memory of 276 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe 32 PID 764 wrote to memory of 276 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe 32 PID 764 wrote to memory of 276 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe 32 PID 764 wrote to memory of 276 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe 32 PID 764 wrote to memory of 276 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe 32 PID 764 wrote to memory of 276 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe 32 PID 764 wrote to memory of 276 764 2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe 32 PID 2812 wrote to memory of 468 2812 yzvuvy.exe 35 PID 2812 wrote to memory of 468 2812 yzvuvy.exe 35 PID 2812 wrote to memory of 468 2812 yzvuvy.exe 35 PID 2812 wrote to memory of 468 2812 yzvuvy.exe 35 PID 2812 wrote to memory of 468 2812 yzvuvy.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1072
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1132
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d6ce39f767b49e1d5bceb890648d6b3_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Roaming\Geve\yzvuvy.exe"C:\Users\Admin\AppData\Roaming\Geve\yzvuvy.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpb0d4bcd8.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:276
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:280
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5f3ce3188d3dcc00fa5970e4c7edc5f4e
SHA14a139a005ca39ba8c37bba475e0a441de1b94cfe
SHA256e3d2e1a7ff3bfc0492dc4959a5799b8ec18585b4f5e03a3685f31ab5cbccc1f4
SHA512f0e8fee1deec33c6bf9dc12bc6b2b8e3c7b451797f05267ce89d569af2f3e2e14d51f01326e42790ea0fbb738955ed7e01f0e6fd787b7c183ff57308cfe1e009
-
Filesize
307KB
MD537ecc69e40f47c71bde90d929fca5d21
SHA1bef8a7e285d42aaa262595f8b3de80d6545df67f
SHA256c2bae656b59d6a480e992fc74fc12365ef6a48936ee1b9c3d5e3d1acbcde0116
SHA5122a9fc6629c824d51e727b26371360354ee3dfa2090d93b96bb3837bc7149c01c74a89ed0b247ee0bfb2a133ba64f3a7fe6f4b491614e77a1175e2bfee318ba7f