Analysis
-
max time kernel
13s -
max time network
28s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-10-2024 21:51
Static task
static1
Behavioral task
behavioral1
Sample
70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe
-
Size
4.4MB
-
MD5
70fa898950f942fa7d9ff085fa8dcd66
-
SHA1
ea4cfdcf8f577c4955e17b6581886471d295fbc6
-
SHA256
5822af7d64cbd61712360d830cb53a45b37cb1c598b2b3d8d2fd4d3d2a035fe6
-
SHA512
70fac8d7611fc4d4e4d3a1c89774c40e860eb6348d892947ed5fdc5271e1c5dafecf5ee8cff671953d675179c211ac828dc4c73fa7fc6852130470abe6eb1986
-
SSDEEP
98304:GXykAvAZGuDkMKYqb+PVW95rELKwaalIBLMruHlrXEG++koSafOX:GyHKkMKYWqs5rELKEIBc6z++kFafy
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot1929200100:AAFApHmZ6GD9WbEolE1gi0bnOTW4ipj-SSA/sendMessage?chat_id=1917426247
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
Logger.exeAlien.exeLogger.exeAlien Exploit.exeAlien.exepid process 1640 Logger.exe 2748 Alien.exe 2252 Logger.exe 1784 Alien Exploit.exe 1756 Alien.exe -
Loads dropped DLL 13 IoCs
Processes:
70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exeLogger.exeLogger.exepid process 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe 1640 Logger.exe 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe 2252 Logger.exe 2252 Logger.exe 2252 Logger.exe 2252 Logger.exe 2252 Logger.exe 2252 Logger.exe 2252 Logger.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\winexplorer = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Explorer.exe" reg.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Systemed\Logger.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Logger.exeAlien Exploit.execmd.exereg.exe70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exeLogger.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Alien Exploit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logger.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3036 timeout.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2872 schtasks.exe 1644 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Alien.exepid process 1756 Alien.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Logger.exeAlien.exepid process 2252 Logger.exe 1756 Alien.exe 1756 Alien.exe 1756 Alien.exe 1756 Alien.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Alien.exetasklist.exeAlien.exedescription pid process Token: SeDebugPrivilege 2748 Alien.exe Token: SeDebugPrivilege 316 tasklist.exe Token: SeDebugPrivilege 1756 Alien.exe Token: SeDebugPrivilege 1756 Alien.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Logger.exeAlien.exepid process 2252 Logger.exe 1756 Alien.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exeLogger.exeLogger.execmd.exeAlien.execmd.exeAlien.exedescription pid process target process PID 1504 wrote to memory of 1640 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Logger.exe PID 1504 wrote to memory of 1640 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Logger.exe PID 1504 wrote to memory of 1640 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Logger.exe PID 1504 wrote to memory of 1640 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Logger.exe PID 1504 wrote to memory of 2748 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Alien.exe PID 1504 wrote to memory of 2748 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Alien.exe PID 1504 wrote to memory of 2748 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Alien.exe PID 1504 wrote to memory of 2748 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Alien.exe PID 1640 wrote to memory of 2252 1640 Logger.exe Logger.exe PID 1640 wrote to memory of 2252 1640 Logger.exe Logger.exe PID 1640 wrote to memory of 2252 1640 Logger.exe Logger.exe PID 1640 wrote to memory of 2252 1640 Logger.exe Logger.exe PID 1504 wrote to memory of 1784 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Alien Exploit.exe PID 1504 wrote to memory of 1784 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Alien Exploit.exe PID 1504 wrote to memory of 1784 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Alien Exploit.exe PID 1504 wrote to memory of 1784 1504 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Alien Exploit.exe PID 2252 wrote to memory of 2044 2252 Logger.exe cmd.exe PID 2252 wrote to memory of 2044 2252 Logger.exe cmd.exe PID 2252 wrote to memory of 2044 2252 Logger.exe cmd.exe PID 2252 wrote to memory of 2044 2252 Logger.exe cmd.exe PID 2044 wrote to memory of 1472 2044 cmd.exe reg.exe PID 2044 wrote to memory of 1472 2044 cmd.exe reg.exe PID 2044 wrote to memory of 1472 2044 cmd.exe reg.exe PID 2044 wrote to memory of 1472 2044 cmd.exe reg.exe PID 2748 wrote to memory of 2872 2748 Alien.exe schtasks.exe PID 2748 wrote to memory of 2872 2748 Alien.exe schtasks.exe PID 2748 wrote to memory of 2872 2748 Alien.exe schtasks.exe PID 2748 wrote to memory of 1484 2748 Alien.exe cmd.exe PID 2748 wrote to memory of 1484 2748 Alien.exe cmd.exe PID 2748 wrote to memory of 1484 2748 Alien.exe cmd.exe PID 1484 wrote to memory of 316 1484 cmd.exe tasklist.exe PID 1484 wrote to memory of 316 1484 cmd.exe tasklist.exe PID 1484 wrote to memory of 316 1484 cmd.exe tasklist.exe PID 1484 wrote to memory of 2864 1484 cmd.exe find.exe PID 1484 wrote to memory of 2864 1484 cmd.exe find.exe PID 1484 wrote to memory of 2864 1484 cmd.exe find.exe PID 1484 wrote to memory of 3036 1484 cmd.exe timeout.exe PID 1484 wrote to memory of 3036 1484 cmd.exe timeout.exe PID 1484 wrote to memory of 3036 1484 cmd.exe timeout.exe PID 1484 wrote to memory of 1756 1484 cmd.exe Alien.exe PID 1484 wrote to memory of 1756 1484 cmd.exe Alien.exe PID 1484 wrote to memory of 1756 1484 cmd.exe Alien.exe PID 1756 wrote to memory of 1644 1756 Alien.exe schtasks.exe PID 1756 wrote to memory of 1644 1756 Alien.exe schtasks.exe PID 1756 wrote to memory of 1644 1756 Alien.exe schtasks.exe PID 1756 wrote to memory of 2156 1756 Alien.exe WerFault.exe PID 1756 wrote to memory of 2156 1756 Alien.exe WerFault.exe PID 1756 wrote to memory of 2156 1756 Alien.exe WerFault.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Roaming\Systemed\Logger.exe"C:\Users\Admin\AppData\Roaming\Systemed\Logger.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Roaming\Systemed\Logger.exe"C:\Users\Admin\AppData\Roaming\Systemed\Logger.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v winexplorer /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Explorer.exe""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v winexplorer /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Explorer.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1472
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Transporter\Alien.exe"C:\Users\Admin\AppData\Roaming\Transporter\Alien.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Alien\Alien.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2872
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp1130.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp1130.tmp.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2748"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:2864
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:3036
-
-
C:\Users\Alien\Alien.exe"Alien.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Alien\Alien.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:1644
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1756 -s 16965⤵PID:2156
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Alien\Alien Exploit.exe"C:\Users\Admin\AppData\Local\Temp\Alien\Alien Exploit.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1784
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f3517db2568f6fcb4565b1413097ec76
SHA13dfae9f49e40300ee8d4b87c65fec33673aba924
SHA2569a2f9b00bc4812800a7c7137f14675073a792adc2905961c3b07a7170d22a625
SHA512b6ca9af81dd0d87c9a1f3a26cd51cb5f847bed85b2b9df5503c8fdb5dda4fa8f1dcb611aeff3368b681e3ba05bad80ef38bd141b22228dc412505b60ebcb73be
-
Filesize
2.5MB
MD5ffc6f8636ed28f50b4a509f21658dfb2
SHA1b302af28714af84a498e14fa61e1173008245c6b
SHA25658159c2b3b27e60a533401b516b0f4f71bab420f2650cfc620a5134209106787
SHA512d795f52ccb6e949da5455cee4a5f763ca64de9472a1a1e87a3c80e611c2393762ec74107aac85e3fa9660d547d6b1afe281da286abe4fc7de3607fea420b09a6
-
Filesize
89KB
MD5f1134b690b2dc0e6aa0f31be1ed9b05f
SHA19c27067c0070b9d9366da78c3d241b01ba1fa4ee
SHA256030bf1aaff316dfbb1b424d91b1340b331c2e38f3e874ae532284c6170d93e7e
SHA5127db97dd004c2d9ce28cd3856f32d96d3a2f696f922c188dbc1150ba35c9a859cdb8d5ed0264a437944ef0fb662f801e2af66f5ecce58c8ee9d2ebf852af8f170
-
Filesize
993KB
MD524c2f70ff5c6eaddb995f2cbb4bc4890
SHA1c6534a6eb3e1e38fe36332d430eb33eeeb8ecc73
SHA2568dceafaaec28740385b1cb8cf2655db68ecf2e561053bfe494795019542491e4
SHA512d262c1b9162f7fcd121fc4c46ce5e85b5ad0e88cadc075ae6fe157ab407fc8558f9860b2cfcae9ae6119bb631c8b978652d1a93e4c2d093b6e7385e81719acf3
-
Filesize
45KB
MD5a9cc2ff4f9cb6f6f297c598e9f541564
SHA1e38159f04683f0e1ed22baba0e7dcc5a9bc09172
SHA25636a7dd2596598916384044b680d62fc7369d246703a57178c27c74214a78585f
SHA5129d99f546e5fa8c235fef007d8eca990350f35d11cd903c5d91611c133166845834c27b1c6a9132c71776754580d9e62fb5072ce6ada1f48feecbf408ca39026f
-
Filesize
1.3MB
MD5d0e36d53cbcea2ac559fec2c596f5b06
SHA18abe0c059ef3403d067a49cf8abcb883c7f113ec
SHA256ae14e8d2ac9adbbb1c1d2a8001a017ba577663322fe7606c22bc0081d2764bc9
SHA5126cc4a3ede744f81a8e619ee919dfc25e3d16bdcdcf25ec49699d9c1b5511e29d88c67bb7f6936363960838a73e4417668fe6a18220bf777baf174bb8278b69be
-
Filesize
69KB
MD59897fb7cfe7f78b4e4521d8d437bea0e
SHA1f7cd930bac39701349ef3043986be42a705da3ad
SHA256d99399bd6ca916c0490af907fb06530839d0797b18a997ed5c091393fc2292f8
SHA512ad310e30a58fc42ce9d1b5265c4041ce59ee8acebc4ec5e3ce58af8415423a09387f303e5111938f51f0dff7a44714917ca860788136f4962baf1fbe8cac1088
-
Filesize
671KB
MD5cfa3517e25c37e808af38fbeaf7f456e
SHA163d4c4317675b3456d48feab390355c6dc3c37f9
SHA256061926aeaaf4f7e0212552cd4bb5d6af0e8607ec77f6eb836b6612ab86645ac9
SHA512e4b3cf3e2e9a4d1f48ba8760c68dbfa9304159381115eb21d0c1552428f793e2b091a744f3578b5cbf005fd2abe62f43eaf1664a8f346de35e22d5499f036674
-
Filesize
181B
MD543c8215d442df374b4da01fa0a4fd5db
SHA1065a4e84338b14bf5684d7bebcc987c6c614d3e9
SHA256dbda7de278ad8107bc328fa49308c4102e562d55a6f75d74dedbca04fbdd3ffa
SHA512f5d0f1afb18a94008491df79c78010dec89c31d32fb720b9bf28ba7b30b11bf00caad15b78596edfafb5f05b3133d05a86769318f39258cde5ef090da20fc399
-
Filesize
264KB
MD57a56659958d88c341bbed247204213a7
SHA1d5e95dcba1cdbf68353d55a393cc0ae5317e36f8
SHA256927bbc42ab483f315b69606fe6406083d03dbbcea0c78a144cd070b4e2731af7
SHA5124c375b38a835e3e7074e7f54c00842f57647dbb0ac26948189bf9fdc715a9cf1f554a3a059f85276d8a073894df73802b1e2fa6b3e2b97ea8ebf88bc39c80684
-
Filesize
4.0MB
MD51b2d0d183db4014dc3b8a498fca36920
SHA1ed90c1eb958c15847b8fca194b1371864f192349
SHA256c24de24798c8b4e22ca151314974cc1f5f26f9c8e029be706811aa825c736632
SHA51244b84c910d70b70a0c798632c643e7fdb84461b1a56c5e22b7d428fc2bd398aec317fbe2328d738c0131dafa5b30466a3c0dcca64c0efb12eb97e24281432545
-
Filesize
150KB
MD5804eff07ca2a670cf3c4f552e4adcc6f
SHA1450311759c3e9164921ad072e23d98a27332a97b
SHA256bc370fb0246d79724b88f2029738fb3c68d126ccb62a1ef4ac62b9bcbba282c1
SHA51258c2d7ec5bcabefc32eed14b4c761f8edaf9931e3990794f9b41fdb05a9fe3e45d6f14d093e65708e6f67f8bb7a94aa30de18abf378d70c953261548ee2c66c4