Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe
-
Size
289KB
-
MD5
82756b1a4f3239a822d4a81e15320353
-
SHA1
9046965793f9d8aa6f46833c7f962d2abe229c84
-
SHA256
2dbba606e95d70e691ac247031683902d25f79acdff65bbba3256c34ea33da42
-
SHA512
351fcddf4e684127c1087fd7a519fb7c752413874a438acf40747066982dc8e6f098fbc73c034081645e63027a49e370838d57ad9fb94f685563866443856646
-
SSDEEP
6144:KTqx4X4g0UE7zrHE/CYXct5Bt14efUxe4UptSlHT4:4ePB/kqb5BtcE4UptWz4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2876 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1888 equfa.exe -
Loads dropped DLL 1 IoCs
pid Process 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\{CDE1B208-D270-AD4F-8712-224B8CD10156} = "C:\\Users\\Admin\\AppData\\Roaming\\Panico\\equfa.exe" equfa.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2380 set thread context of 2876 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language equfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe 1888 equfa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 1888 equfa.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1888 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 30 PID 2380 wrote to memory of 1888 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 30 PID 2380 wrote to memory of 1888 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 30 PID 2380 wrote to memory of 1888 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 30 PID 2380 wrote to memory of 1888 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 30 PID 2380 wrote to memory of 1888 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 30 PID 2380 wrote to memory of 1888 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 30 PID 1888 wrote to memory of 1172 1888 equfa.exe 19 PID 1888 wrote to memory of 1172 1888 equfa.exe 19 PID 1888 wrote to memory of 1172 1888 equfa.exe 19 PID 1888 wrote to memory of 1172 1888 equfa.exe 19 PID 1888 wrote to memory of 1172 1888 equfa.exe 19 PID 1888 wrote to memory of 1284 1888 equfa.exe 20 PID 1888 wrote to memory of 1284 1888 equfa.exe 20 PID 1888 wrote to memory of 1284 1888 equfa.exe 20 PID 1888 wrote to memory of 1284 1888 equfa.exe 20 PID 1888 wrote to memory of 1284 1888 equfa.exe 20 PID 1888 wrote to memory of 1344 1888 equfa.exe 21 PID 1888 wrote to memory of 1344 1888 equfa.exe 21 PID 1888 wrote to memory of 1344 1888 equfa.exe 21 PID 1888 wrote to memory of 1344 1888 equfa.exe 21 PID 1888 wrote to memory of 1344 1888 equfa.exe 21 PID 1888 wrote to memory of 1488 1888 equfa.exe 23 PID 1888 wrote to memory of 1488 1888 equfa.exe 23 PID 1888 wrote to memory of 1488 1888 equfa.exe 23 PID 1888 wrote to memory of 1488 1888 equfa.exe 23 PID 1888 wrote to memory of 1488 1888 equfa.exe 23 PID 1888 wrote to memory of 2380 1888 equfa.exe 29 PID 1888 wrote to memory of 2380 1888 equfa.exe 29 PID 1888 wrote to memory of 2380 1888 equfa.exe 29 PID 1888 wrote to memory of 2380 1888 equfa.exe 29 PID 1888 wrote to memory of 2380 1888 equfa.exe 29 PID 2380 wrote to memory of 2876 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2876 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2876 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2876 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2876 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2876 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2876 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2876 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2876 2380 82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1172
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1284
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82756b1a4f3239a822d4a81e15320353_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Roaming\Panico\equfa.exe"C:\Users\Admin\AppData\Roaming\Panico\equfa.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1888
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd5f8ee94.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD54c658f4efb38c672acf49229451bbda8
SHA1618bf23b19e01ace3ed9bee7aa4b802c56420096
SHA25614ac1239de2a31043a46f342410ff8ee65a99e396d1e3c87080db6fc568f45a6
SHA5122c765040c8ad771ec69d949b5cf169e13c65aa24d33cee2a0f335b5ebb0c5d2f426145a4ec6f2669d670dc0ce122839504e8c0d632557501633b73786f833fcf
-
Filesize
289KB
MD5bceb8493bb6759ad3523be28e55c4132
SHA136362c5ecd94b6902fb4578f7d94c52b15a7d498
SHA25604f3267a776791be361424349b6c475e7e3b8462860d355e3ec9fa8aedbe8cf2
SHA5128a0cc5418eb4932490b306b037b87451ec2a13760bf74038c650f53fed89aee62c1323ba7e8bbe3dd72212bf004de35d8e0bf6761e1ba292394169f6f0bca5df