Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe
-
Size
322KB
-
MD5
b4f05471a141a36da0dc56060ba269c6
-
SHA1
b15fde540133c1808a9815346ae48b53052ed3a7
-
SHA256
b3255977f10fd871e84c39de1600b5acc54b862bce681b959fd210ffcd7f7f9e
-
SHA512
4266b6713e0c896beb8a89d0dea5b3117506e7ae49774e3b7fcad563c11991d10f8a15c817327909a3cd9deefccee7f4bd4b72af8655161c33d9f23c9d584513
-
SSDEEP
6144:Molib4IPXJX5/9RpFWF4jotuWcB+RgH6kBGD+Ye3pU+AFI+DfI/g:WPXpldFWF48sWcB+5QPiI0f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2056 buve.exe -
Loads dropped DLL 1 IoCs
pid Process 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D828F808-3C80-AD4F-7E84-E44A5F96C757} = "C:\\Users\\Admin\\AppData\\Roaming\\Dutey\\buve.exe" buve.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2524 set thread context of 2736 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2852 2736 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language buve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe 2056 buve.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 2056 buve.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2056 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2056 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2056 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2056 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2056 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2056 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2056 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 30 PID 2056 wrote to memory of 1040 2056 buve.exe 17 PID 2056 wrote to memory of 1040 2056 buve.exe 17 PID 2056 wrote to memory of 1040 2056 buve.exe 17 PID 2056 wrote to memory of 1040 2056 buve.exe 17 PID 2056 wrote to memory of 1040 2056 buve.exe 17 PID 2056 wrote to memory of 1104 2056 buve.exe 19 PID 2056 wrote to memory of 1104 2056 buve.exe 19 PID 2056 wrote to memory of 1104 2056 buve.exe 19 PID 2056 wrote to memory of 1104 2056 buve.exe 19 PID 2056 wrote to memory of 1104 2056 buve.exe 19 PID 2056 wrote to memory of 1184 2056 buve.exe 21 PID 2056 wrote to memory of 1184 2056 buve.exe 21 PID 2056 wrote to memory of 1184 2056 buve.exe 21 PID 2056 wrote to memory of 1184 2056 buve.exe 21 PID 2056 wrote to memory of 1184 2056 buve.exe 21 PID 2056 wrote to memory of 808 2056 buve.exe 25 PID 2056 wrote to memory of 808 2056 buve.exe 25 PID 2056 wrote to memory of 808 2056 buve.exe 25 PID 2056 wrote to memory of 808 2056 buve.exe 25 PID 2056 wrote to memory of 808 2056 buve.exe 25 PID 2056 wrote to memory of 2524 2056 buve.exe 29 PID 2056 wrote to memory of 2524 2056 buve.exe 29 PID 2056 wrote to memory of 2524 2056 buve.exe 29 PID 2056 wrote to memory of 2524 2056 buve.exe 29 PID 2056 wrote to memory of 2524 2056 buve.exe 29 PID 2524 wrote to memory of 2736 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2736 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2736 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2736 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2736 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2736 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2736 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2736 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2736 2524 b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe 31 PID 2736 wrote to memory of 2852 2736 cmd.exe 33 PID 2736 wrote to memory of 2852 2736 cmd.exe 33 PID 2736 wrote to memory of 2852 2736 cmd.exe 33 PID 2736 wrote to memory of 2852 2736 cmd.exe 33 PID 2056 wrote to memory of 2620 2056 buve.exe 32 PID 2056 wrote to memory of 2620 2056 buve.exe 32 PID 2056 wrote to memory of 2620 2056 buve.exe 32 PID 2056 wrote to memory of 2620 2056 buve.exe 32 PID 2056 wrote to memory of 2620 2056 buve.exe 32 PID 2056 wrote to memory of 2852 2056 buve.exe 33 PID 2056 wrote to memory of 2852 2056 buve.exe 33 PID 2056 wrote to memory of 2852 2056 buve.exe 33 PID 2056 wrote to memory of 2852 2056 buve.exe 33 PID 2056 wrote to memory of 2852 2056 buve.exe 33
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1040
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1104
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4f05471a141a36da0dc56060ba269c6_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Roaming\Dutey\buve.exe"C:\Users\Admin\AppData\Roaming\Dutey\buve.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp711a36b2.bat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 1124⤵
- Program crash
PID:2852
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:808
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "305088196-1992427638396147423-6382293281952091158-1722640019-284793227-1074339718"1⤵PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322KB
MD503efacf586630c4b28567dbd06dcee0e
SHA12e44e0e0c9f4fa755bc3ed97166f80ee8e909302
SHA256fc82eb02bf3540f0be0a22bfb535df61dc5ac6f5db935b52cbfb1f51ed743075
SHA512936e32fece88a4337580dc817d3b6bc27795bda8f81d6f47ef6baca48c73f4378527fd951f79f1fe0bb2c8ee00642397ec68c6944f8ac24385b2c55896a1de4f