Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe
-
Size
320KB
-
MD5
30c7473bf95078d67bf3c085e646fda6
-
SHA1
0f0fb6e51455985a259f65bf4caf70fa314eb182
-
SHA256
a56378e94e672235543d5dd887b564d4b1cca0b2bb7a8be1919d82af3c791c40
-
SHA512
5251bbba0a883dab9ac03cb2bad9eb2803ee0882d769ffb39e7eae7a18ccd951460cca57ef2b4a51ef92e28d579f74d3c81240f450d973f75a59e65f7d8cb626
-
SSDEEP
6144:fVpAm6qyBu2vukCUT8AlG0KwCkspuJ2ViKpxQX34+ex:fklp+DwCkWG1KpxLZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2780 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 cohe.exe -
Loads dropped DLL 2 IoCs
pid Process 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Osuruhawq = "C:\\Users\\Admin\\AppData\\Roaming\\Owci\\cohe.exe" cohe.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2664 set thread context of 2780 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cohe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Privacy 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\71E678E9-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe 2772 cohe.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeSecurityPrivilege 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe Token: SeSecurityPrivilege 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe Token: SeSecurityPrivilege 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe Token: SeSecurityPrivilege 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe Token: SeSecurityPrivilege 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe Token: SeSecurityPrivilege 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe Token: SeSecurityPrivilege 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe Token: SeSecurityPrivilege 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe Token: SeSecurityPrivilege 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe Token: SeSecurityPrivilege 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe Token: SeManageVolumePrivilege 2568 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2568 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2568 WinMail.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 2772 cohe.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2772 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2772 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2772 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2772 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 31 PID 2772 wrote to memory of 1048 2772 cohe.exe 17 PID 2772 wrote to memory of 1048 2772 cohe.exe 17 PID 2772 wrote to memory of 1048 2772 cohe.exe 17 PID 2772 wrote to memory of 1048 2772 cohe.exe 17 PID 2772 wrote to memory of 1048 2772 cohe.exe 17 PID 2772 wrote to memory of 1056 2772 cohe.exe 18 PID 2772 wrote to memory of 1056 2772 cohe.exe 18 PID 2772 wrote to memory of 1056 2772 cohe.exe 18 PID 2772 wrote to memory of 1056 2772 cohe.exe 18 PID 2772 wrote to memory of 1056 2772 cohe.exe 18 PID 2772 wrote to memory of 1124 2772 cohe.exe 20 PID 2772 wrote to memory of 1124 2772 cohe.exe 20 PID 2772 wrote to memory of 1124 2772 cohe.exe 20 PID 2772 wrote to memory of 1124 2772 cohe.exe 20 PID 2772 wrote to memory of 1124 2772 cohe.exe 20 PID 2772 wrote to memory of 1472 2772 cohe.exe 25 PID 2772 wrote to memory of 1472 2772 cohe.exe 25 PID 2772 wrote to memory of 1472 2772 cohe.exe 25 PID 2772 wrote to memory of 1472 2772 cohe.exe 25 PID 2772 wrote to memory of 1472 2772 cohe.exe 25 PID 2772 wrote to memory of 2664 2772 cohe.exe 30 PID 2772 wrote to memory of 2664 2772 cohe.exe 30 PID 2772 wrote to memory of 2664 2772 cohe.exe 30 PID 2772 wrote to memory of 2664 2772 cohe.exe 30 PID 2772 wrote to memory of 2664 2772 cohe.exe 30 PID 2664 wrote to memory of 2780 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 33 PID 2664 wrote to memory of 2780 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 33 PID 2664 wrote to memory of 2780 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 33 PID 2664 wrote to memory of 2780 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 33 PID 2664 wrote to memory of 2780 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 33 PID 2664 wrote to memory of 2780 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 33 PID 2664 wrote to memory of 2780 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 33 PID 2664 wrote to memory of 2780 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 33 PID 2664 wrote to memory of 2780 2664 30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe 33 PID 2772 wrote to memory of 1400 2772 cohe.exe 35 PID 2772 wrote to memory of 1400 2772 cohe.exe 35 PID 2772 wrote to memory of 1400 2772 cohe.exe 35 PID 2772 wrote to memory of 1400 2772 cohe.exe 35 PID 2772 wrote to memory of 1400 2772 cohe.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1048
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1056
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30c7473bf95078d67bf3c085e646fda6_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Roaming\Owci\cohe.exe"C:\Users\Admin\AppData\Roaming\Owci\cohe.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp4ddcfe44.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1472
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2568
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5c9369db597e1a33c6a80372ffcaca6d2
SHA162f4d4aa79ef0f56d606ccc77576abdade2b3012
SHA25604e6a5533b279b4174ca55ba6eb74cd6aaa805511670b92fbdd88dba828452fe
SHA512feb4eca9457ae914d02a241ba698f070c7ea73bad158e73196f15c4a406e1ad6ba1e0e0a7bcb012c65df242d3335b7b01416220059e9c05c9295eb8bed3d7562
-
Filesize
271B
MD55c38fd342cfff0499784999719ca844e
SHA15c638b25b7b3b9874f5115ed89337e7e7f1d1de6
SHA2565f9eb88824a85cf1731785d22c4ab6470f240069d5112db2ec8195b00e0e3caf
SHA5129290a8beec85e69324b75ff6046298bbe4f29f4322736541951c3f463bda845c0b2fb4693115d6ad7a6fdd74e84e73e66199650e39d3f6ba3afd5c3ec22dc399
-
Filesize
4KB
MD5e415ee39489801545ce3c7d8d5887bb8
SHA19712f728443ea13a5e1383dac5acfe15583e1ac7
SHA2565987c8c56503f5c373e250a7536f1d257f0c96ff3100be13886ee635185d4579
SHA512c71790de0cf5b0117f551a076d2bc39fe240a57fa91e460f2db9cb2778061348e108aa96c560615300e2c7d315c3421bd54da06240c1c788881ed0496abcdf41
-
Filesize
4KB
MD512403f07e8c8dcaad82b18387990630d
SHA137d88ed6752000945898b17c6965da6d7d4e2520
SHA256e4dbb9c867a05b2baece67a696c1b418f4d0a4f7a5fc1a866e9c4ab4a0f28ecf
SHA512f7fdf05d123239131af6e31fbe1d8631d03a1174457ef593b4a60ee1a5e1366478c222b4f9de257f99f3c0355b859f3f762b26c9231dfa1ecac34bc16536d0e1
-
Filesize
320KB
MD54b4026a7a4158cae99855f6f2462e7fb
SHA1b48ecbf59299bccab0183c6c7589e0b6e8b4bcb2
SHA256e9f0b0c4028e057cf3cd507a9e0f33e7248db85af5c365ec8b01e51052ed12f4
SHA51290f8809bf5d94dfb146d9a28fcd800cb1a2ca5fdfbeedfb7afd6eee1e0233199f6919b23858b262a89a77bf1628bd5564ac8217180eba4f26cb7de19c9aa7ba9