Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/11/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe
-
Size
341KB
-
MD5
907d81bc6ee6a9a0c958994729fe54da
-
SHA1
3436f2ceec31d2b3c9bba8c7cb70f4b1060122be
-
SHA256
e1761376183d2eb65753762b1ba7a3bc2f4593903df2e63fa62f421f4a54a2ff
-
SHA512
9f8ebf98655c95a6d915180ad3b4045e0da0430ce82f5e47c977e8300722bd02e9ec9076e8bad84f5478e299704490a4fedbdda319f021a7718ebb8e57619f46
-
SSDEEP
6144:v2AVHBPYYGf7/fKR3Wr1Garj+69x/pjoFfJzv8UtSCNgg2Wm:TgfKc39x/p8FfVhgP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2764 abudo.exe 2852 abudo.exe -
Loads dropped DLL 9 IoCs
pid Process 3040 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 3040 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 292 WerFault.exe 292 WerFault.exe 292 WerFault.exe 292 WerFault.exe 292 WerFault.exe 292 WerFault.exe 292 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D828F808-3C80-AD4F-7E84-E44A5F96C757} = "C:\\Users\\Admin\\AppData\\Roaming\\Emure\\abudo.exe" abudo.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1560 set thread context of 3040 1560 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 31 PID 2764 set thread context of 2852 2764 abudo.exe 34 PID 3040 set thread context of 2504 3040 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 37 -
Program crash 2 IoCs
pid pid_target Process procid_target 2744 1560 WerFault.exe 30 292 2764 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abudo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Privacy 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\0E686E8C-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe 2852 abudo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1620 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1620 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1560 wrote to memory of 3040 1560 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 31 PID 1560 wrote to memory of 2744 1560 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 32 PID 1560 wrote to memory of 2744 1560 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 32 PID 1560 wrote to memory of 2744 1560 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 32 PID 1560 wrote to memory of 2744 1560 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 32 PID 3040 wrote to memory of 2764 3040 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 33 PID 3040 wrote to memory of 2764 3040 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 33 PID 3040 wrote to memory of 2764 3040 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 33 PID 3040 wrote to memory of 2764 3040 907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe 33 PID 2764 wrote to memory of 2852 2764 abudo.exe 34 PID 2764 wrote to memory of 2852 2764 abudo.exe 34 PID 2764 wrote to memory of 2852 2764 abudo.exe 34 PID 2764 wrote to memory of 2852 2764 abudo.exe 34 PID 2764 wrote to memory of 2852 2764 abudo.exe 34 PID 2764 wrote to memory of 2852 2764 abudo.exe 34 PID 2764 wrote to memory of 2852 2764 abudo.exe 34 PID 2764 wrote to memory of 2852 2764 abudo.exe 34 PID 2764 wrote to memory of 2852 2764 abudo.exe 34 PID 2764 wrote to memory of 292 2764 abudo.exe 35 PID 2764 wrote to memory of 292 2764 abudo.exe 35 PID 2764 wrote to memory of 292 2764 abudo.exe 35 PID 2764 wrote to memory of 292 2764 abudo.exe 35 PID 2852 wrote to memory of 1112 2852 abudo.exe 19 PID 2852 wrote to memory of 1112 2852 abudo.exe 19 PID 2852 wrote to memory of 1112 2852 abudo.exe 19 PID 2852 wrote to memory of 1112 2852 abudo.exe 19 PID 2852 wrote to memory of 1112 2852 abudo.exe 19 PID 2852 wrote to memory of 1164 2852 abudo.exe 20 PID 2852 wrote to memory of 1164 2852 abudo.exe 20 PID 2852 wrote to memory of 1164 2852 abudo.exe 20 PID 2852 wrote to memory of 1164 2852 abudo.exe 20 PID 2852 wrote to memory of 1164 2852 abudo.exe 20 PID 2852 wrote to memory of 1232 2852 abudo.exe 21 PID 2852 wrote to memory of 1232 2852 abudo.exe 21 PID 2852 wrote to memory of 1232 2852 abudo.exe 21 PID 2852 wrote to memory of 1232 2852 abudo.exe 21 PID 2852 wrote to memory of 1232 2852 abudo.exe 21 PID 2852 wrote to memory of 316 2852 abudo.exe 23 PID 2852 wrote to memory of 316 2852 abudo.exe 23 PID 2852 wrote to memory of 316 2852 abudo.exe 23 PID 2852 wrote to memory of 316 2852 abudo.exe 23 PID 2852 wrote to memory of 316 2852 abudo.exe 23 PID 2852 wrote to memory of 1560 2852 abudo.exe 30 PID 2852 wrote to memory of 1560 2852 abudo.exe 30 PID 2852 wrote to memory of 1560 2852 abudo.exe 30 PID 2852 wrote to memory of 1560 2852 abudo.exe 30 PID 2852 wrote to memory of 1560 2852 abudo.exe 30 PID 2852 wrote to memory of 3040 2852 abudo.exe 31 PID 2852 wrote to memory of 3040 2852 abudo.exe 31 PID 2852 wrote to memory of 3040 2852 abudo.exe 31 PID 2852 wrote to memory of 3040 2852 abudo.exe 31 PID 2852 wrote to memory of 3040 2852 abudo.exe 31 PID 2852 wrote to memory of 2744 2852 abudo.exe 32 PID 2852 wrote to memory of 2744 2852 abudo.exe 32 PID 2852 wrote to memory of 2744 2852 abudo.exe 32 PID 2852 wrote to memory of 2744 2852 abudo.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\907d81bc6ee6a9a0c958994729fe54da_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Roaming\Emure\abudo.exe"C:\Users\Admin\AppData\Roaming\Emure\abudo.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Roaming\Emure\abudo.exe"C:\Users\Admin\AppData\Roaming\Emure\abudo.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 1165⤵
- Loads dropped DLL
- Program crash
PID:292
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp879880d6.bat"4⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 1163⤵
- Program crash
PID:2744
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:316
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1620
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "805056438-931571054323406462-1406548189-18234271452140664899-358010234-1949696575"1⤵PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5ee707d0a5d855042d840537123ee8e8f
SHA165a9b6ed40117301376d07523f78802d891259cb
SHA256b07ba44cfe9fc3dae2ef043a1556f1d958e0b62a6a664763a83da256e867157b
SHA5125c5c6dfb70fe2dbc8126f80778b4709dbf3164d6a7ae021897a1b923bdfe8b8eaa162ff20ab9b36c9a593f9a8459ce1c2d22372dd3e746538f71a2476ff55dd0
-
Filesize
271B
MD569ed5d744c42a2fb454f3aa81780f1f1
SHA1c01373eec420d6a16e32d8ea0b9e065bc09a6b7e
SHA256ec4697570c567c8a6d918ab4703ac53fb36d8eb3c152f0cbfb62eb731515b890
SHA512cb3f9c1443b52049ac7a1688da1ffd6c0000b5faacaa25c1ced189ab71fce8fbae03ce02534717b1facbe8b51d1f85d844fc4cb2298a245e31c28cff8374e416
-
Filesize
341KB
MD56dabb80e844e448920bb3f76b69a7e97
SHA17d7fbe35745e224d14ea46e774b0f8eda8ee6745
SHA256f2dffab7308cec30505c70073e0a375a6a37f4b41e5725c5e04440d5d97f63e8
SHA512c66b17a2b68728a106447d38a32d102c958d3bd2fcc26fa5619bca9c8efaa58898712ef0b3c3e73a380b9bd0529c7c128c0d8beaa602087db9eb1a8db573d2ab