Analysis
-
max time kernel
143s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 20:29
Static task
static1
Behavioral task
behavioral1
Sample
41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
41ed32f676e434688450e1e8c62ce750
-
SHA1
a3210524c563e4d4c7ab64cb46ec6b4962b6be2a
-
SHA256
3e32f3f41e96b712005cba5375dd1d4b73700c40a2820ad014cfdeeb2c4da8e3
-
SHA512
bc91c6bc4939b577de5242d9978913749178ce1f8b5e808cc772d9d5243223b11188fe572d1dc725b962f165f338bb064a5f5f34a3df59e6810d6058c2ecd8ab
-
SSDEEP
49152:5ZwH0ScADC8NF8nEnsxzexRYUbkOguYwz3+d+hw/AFP:5ZwUSciPNF7nLYbOgiQ0w/eP
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 940 WScript.exe 11 940 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 6 IoCs
pid Process 2792 PekloCheat.exe 964 runme.exe 2236 4konya.exe 2348 newins.exe 2648 mac.exe 2720 unidtrd.exe -
Loads dropped DLL 18 IoCs
pid Process 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 2348 newins.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Fe\Oa\a0000000.vbs 4konya.exe File opened for modification C:\Program Files (x86)\Fe\Oa\ooooooooopopopopopopopopopppopopo.bat 4konya.exe File created C:\Program Files\eoolrym.zpfzmj PekloCheat.exe File created C:\Program Files (x86)\PekloCheat\PekloCheat.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Fe\Oa\b222222.vbs 4konya.exe File opened for modification C:\Program Files (x86)\Fe\Oa\kk099999999999kk.qrw 4konya.exe File created C:\PROGRA~3\Mozilla\unidtrd.exe runme.exe File created C:\Program Files (x86)\PekloCheat\runme.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File created C:\PROGRA~3\Mozilla\soforsm.dll unidtrd.exe File opened for modification C:\Program Files (x86)\PekloCheat 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File created C:\Program Files (x86)\PekloCheat\__tmp_rar_sfx_access_check_259522608 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File created C:\Program Files (x86)\PekloCheat\4konya.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File created C:\Program Files (x86)\PekloCheat\newins.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\PekloCheat\newins.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\PekloCheat\PekloCheat.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\PekloCheat\4konya.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\PekloCheat\runme.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Fe\Oa\cizfffffffffff.az 4konya.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PekloCheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language runme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newins.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4konya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unidtrd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch PekloCheat.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" PekloCheat.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main PekloCheat.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2792 PekloCheat.exe 2792 PekloCheat.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 964 runme.exe 2720 unidtrd.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2792 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2792 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2792 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2792 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2792 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2792 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2792 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 29 PID 1820 wrote to memory of 964 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 30 PID 1820 wrote to memory of 964 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 30 PID 1820 wrote to memory of 964 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 30 PID 1820 wrote to memory of 964 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 30 PID 1820 wrote to memory of 964 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 30 PID 1820 wrote to memory of 964 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 30 PID 1820 wrote to memory of 964 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 30 PID 1820 wrote to memory of 2236 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 31 PID 1820 wrote to memory of 2236 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 31 PID 1820 wrote to memory of 2236 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 31 PID 1820 wrote to memory of 2236 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 31 PID 1820 wrote to memory of 2236 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 31 PID 1820 wrote to memory of 2236 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 31 PID 1820 wrote to memory of 2236 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 31 PID 1820 wrote to memory of 2348 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 32 PID 1820 wrote to memory of 2348 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 32 PID 1820 wrote to memory of 2348 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 32 PID 1820 wrote to memory of 2348 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 32 PID 1820 wrote to memory of 2348 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 32 PID 1820 wrote to memory of 2348 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 32 PID 1820 wrote to memory of 2348 1820 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 32 PID 2348 wrote to memory of 2648 2348 newins.exe 33 PID 2348 wrote to memory of 2648 2348 newins.exe 33 PID 2348 wrote to memory of 2648 2348 newins.exe 33 PID 2348 wrote to memory of 2648 2348 newins.exe 33 PID 2236 wrote to memory of 1648 2236 4konya.exe 34 PID 2236 wrote to memory of 1648 2236 4konya.exe 34 PID 2236 wrote to memory of 1648 2236 4konya.exe 34 PID 2236 wrote to memory of 1648 2236 4konya.exe 34 PID 2236 wrote to memory of 1648 2236 4konya.exe 34 PID 2236 wrote to memory of 1648 2236 4konya.exe 34 PID 2236 wrote to memory of 1648 2236 4konya.exe 34 PID 1648 wrote to memory of 2524 1648 cmd.exe 37 PID 1648 wrote to memory of 2524 1648 cmd.exe 37 PID 1648 wrote to memory of 2524 1648 cmd.exe 37 PID 1648 wrote to memory of 2524 1648 cmd.exe 37 PID 1648 wrote to memory of 2524 1648 cmd.exe 37 PID 1648 wrote to memory of 2524 1648 cmd.exe 37 PID 1648 wrote to memory of 2524 1648 cmd.exe 37 PID 1648 wrote to memory of 940 1648 cmd.exe 38 PID 1648 wrote to memory of 940 1648 cmd.exe 38 PID 1648 wrote to memory of 940 1648 cmd.exe 38 PID 1648 wrote to memory of 940 1648 cmd.exe 38 PID 1648 wrote to memory of 940 1648 cmd.exe 38 PID 1648 wrote to memory of 940 1648 cmd.exe 38 PID 1648 wrote to memory of 940 1648 cmd.exe 38 PID 2648 wrote to memory of 1512 2648 mac.exe 39 PID 2648 wrote to memory of 1512 2648 mac.exe 39 PID 2648 wrote to memory of 1512 2648 mac.exe 39 PID 2832 wrote to memory of 2720 2832 taskeng.exe 42 PID 2832 wrote to memory of 2720 2832 taskeng.exe 42 PID 2832 wrote to memory of 2720 2832 taskeng.exe 42 PID 2832 wrote to memory of 2720 2832 taskeng.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\PekloCheat\PekloCheat.exe"C:\Program Files (x86)\PekloCheat\PekloCheat.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
C:\Program Files (x86)\PekloCheat\runme.exe"C:\Program Files (x86)\PekloCheat\runme.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:964
-
-
C:\Program Files (x86)\PekloCheat\4konya.exe"C:\Program Files (x86)\PekloCheat\4konya.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\Fe\Oa\ooooooooopopopopopopopopopppopopo.bat" "3⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Fe\Oa\a0000000.vbs"4⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:2524
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Fe\Oa\b222222.vbs"4⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:940
-
-
-
-
C:\Program Files (x86)\PekloCheat\newins.exe"C:\Program Files (x86)\PekloCheat\newins.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\mac.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\mac.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 9084⤵PID:1512
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {07E5AB5F-AAE0-4FB6-A5E2-221BEF97C27E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\PROGRA~3\Mozilla\unidtrd.exeC:\PROGRA~3\Mozilla\unidtrd.exe -esjphrh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5f6286dfd1bbab7cdb7efbae72f70e32c
SHA11cb27d9c121c6dd6b7b5f77a7e7edc15cf45c8b1
SHA25666f8c60f08d9bb0006bf7836ba82035d798023ee208da939dd9a6c0c46373be8
SHA5120a49467804f945428df885ca1f1cd7ca2419b3c8b9adf6baff045a647a8dedddc2becd6a15f280f80c3ea16c526e3a1843b66cf4aed47749174e4936e8acf830
-
Filesize
1KB
MD558eeef7fad223983c70b5d0c91aba472
SHA1b42ca4c0b460f92d70bd0f3833b225a107a52cfe
SHA2566d80a4d9927fae66e838dc195c857630a81ffc970cab587778e1dea21cff49db
SHA512e85edb73a639fe947904960956a28d701dee62d1c434ffb11b1d55254705eaf335524c4240bd7dfd22d455acdee68d6600d03f95298ee466148faf58aa680432
-
Filesize
161B
MD555106fe0a0c4bd1efdf0262512175d87
SHA1983dac43a06ad9bc9c487a40717fbc6b5f1b4a23
SHA2562783fd1e87d7378c897919a6e08b5ca9263f3529428f78e0743953dd0b5cebee
SHA5120c17de06c74a95a20d4669e963fb2998177f969f037968c13f6afc72350f2d8672e00d9803f1d07961b65fa1dd309b9694bc97fcc95cc2580f1e394c9c50770d
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
65B
MD53e08a7aa432b615b5d0a8d01704b20c1
SHA1db1f8fa524f7b078404466d3175f371c39aabb83
SHA256e6ff55027225808db193cc6367122b7285f101150bd49333cb872e3266d46cd9
SHA5120048d76339bf007e53c04c71aa0982ab09082c51fd8533ca652610bb54481e123dea4fb80653585d5285651ed85b4093308bed50b68cbfe75afd32714d670785
-
Filesize
1KB
MD5c6c8bab32115a3989f153b691ced733d
SHA1645412f15b3e36fd5eb184e27bf39c15599748d5
SHA256c1b73590afb430e3f4df5ff2a219a3d563a22cd181ced8daa21ac6f874c9a1e1
SHA512b84e61c820f19fbfa7aaffccae0b62d08b3106acc3bcd9e902e8ac9c08da44435a4b160c9c53bb9035322920d356e8c10b397c9901ed1dca85882f4f0a70c1ed
-
Filesize
48KB
MD58ca21ef0590d00d8c5537886019bc330
SHA10a47c8050b4334880a92f6ba758db85cf1716045
SHA2565c8a4f97a4401e3dbed6b62efb4d5e4b91a65ee19442cacc05b98f395ffa852b
SHA512aeff5c046817abe9449bddff25f587d0f6c33d0e587ca6ebef8747212bc1fa3c8337dc84f78ca9330fa16ee949fa788103da0160a335acedf1d442665fce1368
-
Filesize
4KB
MD5694f8b91c2d757022aab5641cabb12be
SHA1c8e433ec7b966f31d3739da0d3d9684d01c79ab4
SHA2561fc8e46a9bcfbdd2bc7e5a18369b2eb048a209b921452272b0493608be16204a
SHA512f4932012d059ccde15e9623f21e24fdfaef37f8570af83f4d9aff9f3309b6612b98cc16e73e6e5e58538a9b8c88da38b6c4c99f3a08b0347d8f392784c944423
-
Filesize
1KB
MD592036828bac612fa2841b2c29abfefca
SHA17e5918fbc087cf229b82fd2eb3095f7565aaae92
SHA256bdbed96ff491e15ec277374246b2590fe5999f168f484063873ffaa2d0e882e4
SHA5120c4f7cce5f47738c0f931374abffe2b05060d55b1dcf5baf82453b26026de97a5fc88d5471abfcf26e687f10c8ab70a12a2a89c066bda69fd197acec63354226
-
Filesize
128KB
MD57b69e435c062c5fad1b9d15e6fcf905e
SHA13cd33e4cda1eec87758c7a4e59f61b92a00e0dcc
SHA256f6de28551cfe268583d7f9d34b35c41af9fdc46026f66d6a542900e67724ca8b
SHA512dcc7e33cf990e21a8a8b3bc3e3598e5604f4ad58f2de437459b0acaca296b27be9f438e76024607c65db0cc6ebf198d58dfb2dada72b3b8bbc62ee68bd89cf72
-
Filesize
1.4MB
MD5bd8747967e7fb5f7e80c1be71f4c796f
SHA17f71cf7a89f8f5f576898bef94714de1d3c57c92
SHA2561168437d522bbd8102351cf91c09e92c8ddc92a5c4e0a3a2a6c9a1ee5861fcbd
SHA512a03076d8e3f99ba156b8922182d95da8d712a5f9dcf1c1f517eadb2172f2103c10a3e9b1b6a14dcd8677cb759c9c97119e0cf720e6f20055b9ac9cf6d1226da4
-
Filesize
123KB
MD54496eb67c762bfbbd26b9b5fe9eb1c67
SHA1d59a0935137d04831cd19652e4899b912df0e6ce
SHA256f5de87c232daa8e5b17393841b758ab576916df80b0e395a845ad3d3f4b58580
SHA51291fb42b40dd4b65b14133b7a2bbab66cd0e5aa85ee118841fc57d92d163a0fd80319ae203a1cab12314c7c18aa48ddf67baae2e68242a44a47b69c667cb79676
-
Filesize
176KB
MD5f6d2eefd8d5eadb52ec0cd3c3526b7b5
SHA1299f02ea5aff2231f92b024ec830b6c1af286977
SHA256a2ed71f40e20980940eb47d0f1a5fffde0627934536de52104d1caf956912c7c
SHA5120c0d22f8c85192d686841915d1b306f9e4243acf40b0ee2053c86d84970cc96cf75f5c54b1b8df5105a69024b1b416cc6abcd00dfa0673606fcf5f99269abba6
-
Filesize
85KB
MD5b5d986697e72cc0554e699510741e46a
SHA1bee206bb66f98529c01f5bea56169dcc36addc27
SHA2563efb733026ae60c8394d85c9d7f3c65dcd83f12450bfc9cea4ebddebccb53274
SHA5125d1dccfd6fa157fa3e302356bc89caf750476f3a48eab2647df05ae3da364f91e214f7bcc7d1ca6128a368327c063284a09bcd9713a178ef555518eddb0686d9