Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 21:51
Static task
static1
Behavioral task
behavioral1
Sample
70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe
-
Size
4.4MB
-
MD5
70fa898950f942fa7d9ff085fa8dcd66
-
SHA1
ea4cfdcf8f577c4955e17b6581886471d295fbc6
-
SHA256
5822af7d64cbd61712360d830cb53a45b37cb1c598b2b3d8d2fd4d3d2a035fe6
-
SHA512
70fac8d7611fc4d4e4d3a1c89774c40e860eb6348d892947ed5fdc5271e1c5dafecf5ee8cff671953d675179c211ac828dc4c73fa7fc6852130470abe6eb1986
-
SSDEEP
98304:GXykAvAZGuDkMKYqb+PVW95rELKwaalIBLMruHlrXEG++koSafOX:GyHKkMKYWqs5rELKEIBc6z++kFafy
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot1929200100:AAFApHmZ6GD9WbEolE1gi0bnOTW4ipj-SSA/sendMessage?chat_id=1917426247
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Alien.exe70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exeAlien.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Alien.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Alien.exe -
Executes dropped EXE 5 IoCs
Processes:
Logger.exeAlien.exeAlien Exploit.exeLogger.exeAlien.exepid process 3060 Logger.exe 2932 Alien.exe 3760 Alien Exploit.exe 212 Logger.exe 412 Alien.exe -
Loads dropped DLL 7 IoCs
Processes:
Logger.exepid process 212 Logger.exe 212 Logger.exe 212 Logger.exe 212 Logger.exe 212 Logger.exe 212 Logger.exe 212 Logger.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winexplorer = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Explorer.exe" reg.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Systemed\Logger.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exeLogger.exeAlien Exploit.exeLogger.execmd.exereg.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Alien Exploit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1908 timeout.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4344 schtasks.exe 2892 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Alien.exepid process 412 Alien.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Logger.exeAlien.exepid process 212 Logger.exe 212 Logger.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe 412 Alien.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Alien.exetasklist.exeAlien.exedescription pid process Token: SeDebugPrivilege 2932 Alien.exe Token: SeDebugPrivilege 4840 tasklist.exe Token: SeDebugPrivilege 412 Alien.exe Token: SeDebugPrivilege 412 Alien.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Logger.exeAlien.exepid process 212 Logger.exe 412 Alien.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exeLogger.exeLogger.execmd.exeAlien.execmd.exeAlien.exedescription pid process target process PID 1924 wrote to memory of 3060 1924 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Logger.exe PID 1924 wrote to memory of 3060 1924 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Logger.exe PID 1924 wrote to memory of 3060 1924 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Logger.exe PID 1924 wrote to memory of 2932 1924 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Alien.exe PID 1924 wrote to memory of 2932 1924 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Alien.exe PID 1924 wrote to memory of 3760 1924 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Alien Exploit.exe PID 1924 wrote to memory of 3760 1924 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Alien Exploit.exe PID 1924 wrote to memory of 3760 1924 70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe Alien Exploit.exe PID 3060 wrote to memory of 212 3060 Logger.exe Logger.exe PID 3060 wrote to memory of 212 3060 Logger.exe Logger.exe PID 3060 wrote to memory of 212 3060 Logger.exe Logger.exe PID 212 wrote to memory of 400 212 Logger.exe cmd.exe PID 212 wrote to memory of 400 212 Logger.exe cmd.exe PID 212 wrote to memory of 400 212 Logger.exe cmd.exe PID 400 wrote to memory of 4968 400 cmd.exe reg.exe PID 400 wrote to memory of 4968 400 cmd.exe reg.exe PID 400 wrote to memory of 4968 400 cmd.exe reg.exe PID 2932 wrote to memory of 2892 2932 Alien.exe schtasks.exe PID 2932 wrote to memory of 2892 2932 Alien.exe schtasks.exe PID 2932 wrote to memory of 2808 2932 Alien.exe cmd.exe PID 2932 wrote to memory of 2808 2932 Alien.exe cmd.exe PID 2808 wrote to memory of 4840 2808 cmd.exe tasklist.exe PID 2808 wrote to memory of 4840 2808 cmd.exe tasklist.exe PID 2808 wrote to memory of 4016 2808 cmd.exe find.exe PID 2808 wrote to memory of 4016 2808 cmd.exe find.exe PID 2808 wrote to memory of 1908 2808 cmd.exe timeout.exe PID 2808 wrote to memory of 1908 2808 cmd.exe timeout.exe PID 2808 wrote to memory of 412 2808 cmd.exe Alien.exe PID 2808 wrote to memory of 412 2808 cmd.exe Alien.exe PID 412 wrote to memory of 4344 412 Alien.exe schtasks.exe PID 412 wrote to memory of 4344 412 Alien.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\70fa898950f942fa7d9ff085fa8dcd66_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\Systemed\Logger.exe"C:\Users\Admin\AppData\Roaming\Systemed\Logger.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Roaming\Systemed\Logger.exe"C:\Users\Admin\AppData\Roaming\Systemed\Logger.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v winexplorer /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Explorer.exe""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v winexplorer /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Explorer.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4968
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Transporter\Alien.exe"C:\Users\Admin\AppData\Roaming\Transporter\Alien.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Alien\Alien.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2892
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpA46E.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpA46E.tmp.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2932"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:4016
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:1908
-
-
C:\Users\Alien\Alien.exe"Alien.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Alien\Alien.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:4344
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Alien\Alien Exploit.exe"C:\Users\Admin\AppData\Local\Temp\Alien\Alien Exploit.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3760
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55cb90c90e96a3b36461ed44d339d02e5
SHA15508281a22cca7757bc4fbdb0a8e885c9f596a04
SHA25634c15d8e79fef4bddec7e34f3426df3b68f8fc6deac29ea12d110f6c529fe3bb
SHA51263735938c841c28824e3482559df18839930acc5ea8600b1074439b70a2f600a92f41593568e49991f25f079e7f7361b4f1678feadbf004f6e9e4d51d36598d4
-
Filesize
264KB
MD57a56659958d88c341bbed247204213a7
SHA1d5e95dcba1cdbf68353d55a393cc0ae5317e36f8
SHA256927bbc42ab483f315b69606fe6406083d03dbbcea0c78a144cd070b4e2731af7
SHA5124c375b38a835e3e7074e7f54c00842f57647dbb0ac26948189bf9fdc715a9cf1f554a3a059f85276d8a073894df73802b1e2fa6b3e2b97ea8ebf88bc39c80684
-
Filesize
1KB
MD5f3517db2568f6fcb4565b1413097ec76
SHA13dfae9f49e40300ee8d4b87c65fec33673aba924
SHA2569a2f9b00bc4812800a7c7137f14675073a792adc2905961c3b07a7170d22a625
SHA512b6ca9af81dd0d87c9a1f3a26cd51cb5f847bed85b2b9df5503c8fdb5dda4fa8f1dcb611aeff3368b681e3ba05bad80ef38bd141b22228dc412505b60ebcb73be
-
Filesize
89KB
MD5f1134b690b2dc0e6aa0f31be1ed9b05f
SHA19c27067c0070b9d9366da78c3d241b01ba1fa4ee
SHA256030bf1aaff316dfbb1b424d91b1340b331c2e38f3e874ae532284c6170d93e7e
SHA5127db97dd004c2d9ce28cd3856f32d96d3a2f696f922c188dbc1150ba35c9a859cdb8d5ed0264a437944ef0fb662f801e2af66f5ecce58c8ee9d2ebf852af8f170
-
Filesize
993KB
MD524c2f70ff5c6eaddb995f2cbb4bc4890
SHA1c6534a6eb3e1e38fe36332d430eb33eeeb8ecc73
SHA2568dceafaaec28740385b1cb8cf2655db68ecf2e561053bfe494795019542491e4
SHA512d262c1b9162f7fcd121fc4c46ce5e85b5ad0e88cadc075ae6fe157ab407fc8558f9860b2cfcae9ae6119bb631c8b978652d1a93e4c2d093b6e7385e81719acf3
-
Filesize
45KB
MD5a9cc2ff4f9cb6f6f297c598e9f541564
SHA1e38159f04683f0e1ed22baba0e7dcc5a9bc09172
SHA25636a7dd2596598916384044b680d62fc7369d246703a57178c27c74214a78585f
SHA5129d99f546e5fa8c235fef007d8eca990350f35d11cd903c5d91611c133166845834c27b1c6a9132c71776754580d9e62fb5072ce6ada1f48feecbf408ca39026f
-
Filesize
1.3MB
MD5d0e36d53cbcea2ac559fec2c596f5b06
SHA18abe0c059ef3403d067a49cf8abcb883c7f113ec
SHA256ae14e8d2ac9adbbb1c1d2a8001a017ba577663322fe7606c22bc0081d2764bc9
SHA5126cc4a3ede744f81a8e619ee919dfc25e3d16bdcdcf25ec49699d9c1b5511e29d88c67bb7f6936363960838a73e4417668fe6a18220bf777baf174bb8278b69be
-
Filesize
69KB
MD59897fb7cfe7f78b4e4521d8d437bea0e
SHA1f7cd930bac39701349ef3043986be42a705da3ad
SHA256d99399bd6ca916c0490af907fb06530839d0797b18a997ed5c091393fc2292f8
SHA512ad310e30a58fc42ce9d1b5265c4041ce59ee8acebc4ec5e3ce58af8415423a09387f303e5111938f51f0dff7a44714917ca860788136f4962baf1fbe8cac1088
-
Filesize
2.5MB
MD5ffc6f8636ed28f50b4a509f21658dfb2
SHA1b302af28714af84a498e14fa61e1173008245c6b
SHA25658159c2b3b27e60a533401b516b0f4f71bab420f2650cfc620a5134209106787
SHA512d795f52ccb6e949da5455cee4a5f763ca64de9472a1a1e87a3c80e611c2393762ec74107aac85e3fa9660d547d6b1afe281da286abe4fc7de3607fea420b09a6
-
Filesize
671KB
MD5cfa3517e25c37e808af38fbeaf7f456e
SHA163d4c4317675b3456d48feab390355c6dc3c37f9
SHA256061926aeaaf4f7e0212552cd4bb5d6af0e8607ec77f6eb836b6612ab86645ac9
SHA512e4b3cf3e2e9a4d1f48ba8760c68dbfa9304159381115eb21d0c1552428f793e2b091a744f3578b5cbf005fd2abe62f43eaf1664a8f346de35e22d5499f036674
-
Filesize
181B
MD5b554b980fd4987e3419b22c1de5319f9
SHA159040c88db84e9bef7850f742e299a5f61f118ed
SHA2569c5d934de4ba8661133ad181cce117c65c62b2a713a177e2f80762f089a70de0
SHA512afb30f98e956cf2be140e115d96627a3d391cc2c6a5f0c3a3d86645061eb183a8f83d8177cf335d6c9bae7f5d84c469d019da3690af0b6a97a8c0e32c6021cf5
-
Filesize
4.0MB
MD51b2d0d183db4014dc3b8a498fca36920
SHA1ed90c1eb958c15847b8fca194b1371864f192349
SHA256c24de24798c8b4e22ca151314974cc1f5f26f9c8e029be706811aa825c736632
SHA51244b84c910d70b70a0c798632c643e7fdb84461b1a56c5e22b7d428fc2bd398aec317fbe2328d738c0131dafa5b30466a3c0dcca64c0efb12eb97e24281432545
-
Filesize
150KB
MD5804eff07ca2a670cf3c4f552e4adcc6f
SHA1450311759c3e9164921ad072e23d98a27332a97b
SHA256bc370fb0246d79724b88f2029738fb3c68d126ccb62a1ef4ac62b9bcbba282c1
SHA51258c2d7ec5bcabefc32eed14b4c761f8edaf9931e3990794f9b41fdb05a9fe3e45d6f14d093e65708e6f67f8bb7a94aa30de18abf378d70c953261548ee2c66c4