Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-10-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
62a0472fcfcad798692ab44daddd233d
-
SHA1
bf857bf4667d167e82b39c95bc0ac9d5ee0136a3
-
SHA256
b24500f0f082966518725371932717cfcfce280be723755cfa52ac183b2d1f8f
-
SHA512
34ac14d268761d4f6e1d147eb847c7ddc5529b6972b47cb51e55ccf47e15b1bcefe206e0d4069ff35f631a43b684af1bcddc75da887a8fafb873422827a7968c
-
SSDEEP
24576:iaCwtiqV012KXkJHsYiyGQWgANWGyo70zWGT8y5N7+:W56xi9ZUGFqxy
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
MHRMI.exesecurity.exesecurity.exesecurity.exesecurity.exepid Process 2728 MHRMI.exe 2168 security.exe 980 security.exe 1852 security.exe 2700 security.exe -
Loads dropped DLL 9 IoCs
Processes:
62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exepid Process 1208 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 1208 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 1208 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 1208 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 1604 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 1604 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 1604 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 1604 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 1604 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Security = "C:\\Users\\Admin\\AppData\\Roaming\\Security\\security.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exesecurity.exedescription pid Process procid_target PID 2840 set thread context of 1208 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 30 PID 2840 set thread context of 1604 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 31 PID 2168 set thread context of 980 2168 security.exe 37 PID 2168 set thread context of 1852 2168 security.exe 38 PID 2168 set thread context of 2700 2168 security.exe 39 -
Processes:
resource yara_rule behavioral1/memory/1604-147-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1604-145-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1604-161-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1208-160-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/980-335-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1604-376-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1852-373-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/980-328-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1208-380-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1852-385-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exeMHRMI.exesecurity.exesecurity.exesecurity.exesecurity.exe62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe62a0472fcfcad798692ab44daddd233d_JaffaCakes118.execmd.exereg.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MHRMI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
security.exesecurity.exedescription pid Process Token: SeIncreaseQuotaPrivilege 2700 security.exe Token: SeSecurityPrivilege 2700 security.exe Token: SeTakeOwnershipPrivilege 2700 security.exe Token: SeLoadDriverPrivilege 2700 security.exe Token: SeSystemProfilePrivilege 2700 security.exe Token: SeSystemtimePrivilege 2700 security.exe Token: SeProfSingleProcessPrivilege 2700 security.exe Token: SeIncBasePriorityPrivilege 2700 security.exe Token: SeCreatePagefilePrivilege 2700 security.exe Token: SeBackupPrivilege 2700 security.exe Token: SeRestorePrivilege 2700 security.exe Token: SeShutdownPrivilege 2700 security.exe Token: SeDebugPrivilege 2700 security.exe Token: SeSystemEnvironmentPrivilege 2700 security.exe Token: SeChangeNotifyPrivilege 2700 security.exe Token: SeRemoteShutdownPrivilege 2700 security.exe Token: SeUndockPrivilege 2700 security.exe Token: SeManageVolumePrivilege 2700 security.exe Token: SeImpersonatePrivilege 2700 security.exe Token: SeCreateGlobalPrivilege 2700 security.exe Token: 33 2700 security.exe Token: 34 2700 security.exe Token: 35 2700 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe Token: SeDebugPrivilege 1852 security.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exesecurity.exesecurity.exesecurity.exesecurity.exepid Process 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 1604 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 1208 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 2168 security.exe 980 security.exe 1852 security.exe 2700 security.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe62a0472fcfcad798692ab44daddd233d_JaffaCakes118.execmd.exesecurity.exedescription pid Process procid_target PID 2840 wrote to memory of 1208 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 30 PID 2840 wrote to memory of 1208 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 30 PID 2840 wrote to memory of 1208 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 30 PID 2840 wrote to memory of 1208 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 30 PID 2840 wrote to memory of 1208 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 30 PID 2840 wrote to memory of 1208 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 30 PID 2840 wrote to memory of 1208 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 30 PID 2840 wrote to memory of 1208 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 30 PID 2840 wrote to memory of 1604 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 31 PID 2840 wrote to memory of 1604 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 31 PID 2840 wrote to memory of 1604 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 31 PID 2840 wrote to memory of 1604 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 31 PID 2840 wrote to memory of 1604 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 31 PID 2840 wrote to memory of 1604 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 31 PID 2840 wrote to memory of 1604 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 31 PID 2840 wrote to memory of 1604 2840 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 31 PID 1208 wrote to memory of 2728 1208 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 32 PID 1208 wrote to memory of 2728 1208 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 32 PID 1208 wrote to memory of 2728 1208 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 32 PID 1208 wrote to memory of 2728 1208 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 32 PID 1604 wrote to memory of 2264 1604 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 33 PID 1604 wrote to memory of 2264 1604 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 33 PID 1604 wrote to memory of 2264 1604 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 33 PID 1604 wrote to memory of 2264 1604 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 33 PID 2264 wrote to memory of 1600 2264 cmd.exe 35 PID 2264 wrote to memory of 1600 2264 cmd.exe 35 PID 2264 wrote to memory of 1600 2264 cmd.exe 35 PID 2264 wrote to memory of 1600 2264 cmd.exe 35 PID 1604 wrote to memory of 2168 1604 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 36 PID 1604 wrote to memory of 2168 1604 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 36 PID 1604 wrote to memory of 2168 1604 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 36 PID 1604 wrote to memory of 2168 1604 62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe 36 PID 2168 wrote to memory of 980 2168 security.exe 37 PID 2168 wrote to memory of 980 2168 security.exe 37 PID 2168 wrote to memory of 980 2168 security.exe 37 PID 2168 wrote to memory of 980 2168 security.exe 37 PID 2168 wrote to memory of 980 2168 security.exe 37 PID 2168 wrote to memory of 980 2168 security.exe 37 PID 2168 wrote to memory of 980 2168 security.exe 37 PID 2168 wrote to memory of 980 2168 security.exe 37 PID 2168 wrote to memory of 1852 2168 security.exe 38 PID 2168 wrote to memory of 1852 2168 security.exe 38 PID 2168 wrote to memory of 1852 2168 security.exe 38 PID 2168 wrote to memory of 1852 2168 security.exe 38 PID 2168 wrote to memory of 1852 2168 security.exe 38 PID 2168 wrote to memory of 1852 2168 security.exe 38 PID 2168 wrote to memory of 1852 2168 security.exe 38 PID 2168 wrote to memory of 1852 2168 security.exe 38 PID 2168 wrote to memory of 2700 2168 security.exe 39 PID 2168 wrote to memory of 2700 2168 security.exe 39 PID 2168 wrote to memory of 2700 2168 security.exe 39 PID 2168 wrote to memory of 2700 2168 security.exe 39 PID 2168 wrote to memory of 2700 2168 security.exe 39 PID 2168 wrote to memory of 2700 2168 security.exe 39 PID 2168 wrote to memory of 2700 2168 security.exe 39 PID 2168 wrote to memory of 2700 2168 security.exe 39 PID 2168 wrote to memory of 2700 2168 security.exe 39 PID 2168 wrote to memory of 2700 2168 security.exe 39 PID 2168 wrote to memory of 2700 2168 security.exe 39 PID 2168 wrote to memory of 2700 2168 security.exe 39 PID 2168 wrote to memory of 2700 2168 security.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Roaming\MHRMI.exe"C:\Users\Admin\AppData\Roaming\MHRMI.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
C:\Users\Admin\AppData\Local\Temp\62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RVHFJ.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Security" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Security\security.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1600
-
-
-
C:\Users\Admin\AppData\Roaming\Security\security.exe"C:\Users\Admin\AppData\Roaming\Security\security.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Roaming\Security\security.exe"C:\Users\Admin\AppData\Roaming\Security\security.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:980
-
-
C:\Users\Admin\AppData\Roaming\Security\security.exe"C:\Users\Admin\AppData\Roaming\Security\security.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1852
-
-
C:\Users\Admin\AppData\Roaming\Security\security.exe"C:\Users\Admin\AppData\Roaming\Security\security.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2700
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD56f473a1ba53e043362047f72e20b34f4
SHA1e8f121a589e1207ed950453376ee1d21b1223835
SHA2565fbce2c77a90ba9edbcf60be3851ab81633b7c10b1babb624d475c7be589de4b
SHA512b4976d40bc708ae6cddf367a5382cd532e4cf235b848cdaa4e4d317e06d9126e50745a7772591bc21dc7380689f4399e57501b0aa73cd231bce32e22d53b0818
-
Filesize
396KB
MD597dfac6e0541c19a7cc8adb8fe322d4e
SHA13d30f9a61e70ee3970d041a83c5f64ae84bddf0b
SHA256247c8b720d4ffa93f1b1f72d6df7dcacd80fb91d8f6747a339ba75fe690d89d1
SHA51261ae747e122fa662035ddb29476a8381f320f8c3ba9dd3ceeb4a91e85eba61104a10a6461d54eca14a90be393745cda09222ddb29985d996ce8855b2bba27888
-
Filesize
1.2MB
MD5b785316e4cd0e98059f057e2f19a2232
SHA1cd366d0ffc85cd024cc650518decc2357ddbc39f
SHA256003a0f2cb8005aeed5da056a1c4ed56433090d59b04b485d7a4f5b660e30e330
SHA512b1986c45b64e89fd77341e035922f82dea30e0cc8a20ca42ea9c5abaf6f86b1ca7a48fb74434255623ed42c838aa5d727c6599493ca09c8bfef4bacee341c79b