Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-10-2024 02:49
Static task
static1
Behavioral task
behavioral1
Sample
65437df61660e464407c0934040d1870_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
65437df61660e464407c0934040d1870_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
65437df61660e464407c0934040d1870_JaffaCakes118.exe
-
Size
144KB
-
MD5
65437df61660e464407c0934040d1870
-
SHA1
41f351a6802c4219fa7ee85973c27c393647ef73
-
SHA256
6e89a44a73818b439f124147d2024fec5d2f8a00054e45795d5a7d7fca97d026
-
SHA512
f3a539f886be53323d68f2894edb0e39b9cf0417def99bb5b8e48ff5a8555302723662ce7a386f038331b02add0dccd2552832d819cc949318cb7fa8d9a1870b
-
SSDEEP
3072:uaVP6HaGT5SR8fGzIpYDx1cTqO9lkS2jbxWGq8Wr:uaGoEpWxSbGq8k
Malware Config
Extracted
tofsee
91.218.39.211
188.130.237.44
91.204.162.103
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2752 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
fgywwqiv.exepid process 2008 fgywwqiv.exe -
Loads dropped DLL 2 IoCs
Processes:
65437df61660e464407c0934040d1870_JaffaCakes118.exepid process 2684 65437df61660e464407c0934040d1870_JaffaCakes118.exe 2684 65437df61660e464407c0934040d1870_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
65437df61660e464407c0934040d1870_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\fgywwqiv.exe\"" 65437df61660e464407c0934040d1870_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fgywwqiv.exedescription pid process target process PID 2008 set thread context of 2884 2008 fgywwqiv.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.execmd.exe65437df61660e464407c0934040d1870_JaffaCakes118.exefgywwqiv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65437df61660e464407c0934040d1870_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fgywwqiv.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
65437df61660e464407c0934040d1870_JaffaCakes118.exefgywwqiv.exepid process 2684 65437df61660e464407c0934040d1870_JaffaCakes118.exe 2008 fgywwqiv.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
65437df61660e464407c0934040d1870_JaffaCakes118.exefgywwqiv.exedescription pid process target process PID 2684 wrote to memory of 2008 2684 65437df61660e464407c0934040d1870_JaffaCakes118.exe fgywwqiv.exe PID 2684 wrote to memory of 2008 2684 65437df61660e464407c0934040d1870_JaffaCakes118.exe fgywwqiv.exe PID 2684 wrote to memory of 2008 2684 65437df61660e464407c0934040d1870_JaffaCakes118.exe fgywwqiv.exe PID 2684 wrote to memory of 2008 2684 65437df61660e464407c0934040d1870_JaffaCakes118.exe fgywwqiv.exe PID 2008 wrote to memory of 2884 2008 fgywwqiv.exe svchost.exe PID 2008 wrote to memory of 2884 2008 fgywwqiv.exe svchost.exe PID 2008 wrote to memory of 2884 2008 fgywwqiv.exe svchost.exe PID 2008 wrote to memory of 2884 2008 fgywwqiv.exe svchost.exe PID 2008 wrote to memory of 2884 2008 fgywwqiv.exe svchost.exe PID 2008 wrote to memory of 2884 2008 fgywwqiv.exe svchost.exe PID 2684 wrote to memory of 2752 2684 65437df61660e464407c0934040d1870_JaffaCakes118.exe cmd.exe PID 2684 wrote to memory of 2752 2684 65437df61660e464407c0934040d1870_JaffaCakes118.exe cmd.exe PID 2684 wrote to memory of 2752 2684 65437df61660e464407c0934040d1870_JaffaCakes118.exe cmd.exe PID 2684 wrote to memory of 2752 2684 65437df61660e464407c0934040d1870_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65437df61660e464407c0934040d1870_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65437df61660e464407c0934040d1870_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\fgywwqiv.exe"C:\Users\Admin\fgywwqiv.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2150.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD5840a9bac596baececfb690932d11c01c
SHA12a7fd03c1f5107cbac73138486f049f5b5cf1830
SHA25655783e95e655e6b2ba92eaef8dd9472cfcbda29c40e1d90956ecc5ba95135114
SHA5120d91028813eb6714d9f2bbcb8778fd6710ad3abe83c9ad11d078aaf26f56b35ad7fd4ea9a330a276d18cba2b26dd812ee81455a357e40cdde9f4f111727bc9d2
-
Filesize
44.1MB
MD517331d00d3a7798c1543717d39a54676
SHA1f42ff25be9f593ef73ae14c44a803747e95f4c1f
SHA25635331aae01c9db87239cef34fc28903bc149ef2bd94e42bf4c8f54b153bb4382
SHA51286afc8e79f330768450735b8c67393b0c653b432b32add17f67b1052a7ba96036088540ca8669fc499c266fda3831ea26ef9f636978ca61fdc882f94b0ad42a5