Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/02/2025, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_23bc66b499bfc507fd1e14628d90a2cf.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_23bc66b499bfc507fd1e14628d90a2cf.exe
-
Size
128KB
-
MD5
23bc66b499bfc507fd1e14628d90a2cf
-
SHA1
8a671990a27e718970652c90aeceab5e5fee8fe2
-
SHA256
5b91585b450a0eebcd9e9cde4313725563e981f837d0b0d26446692520e12f9c
-
SHA512
029f9c7189dff322cfe4096b0f210a480c1b30167484eefb9daa5578407c16527cb1d63dfdf9dd84ef330984c82cf731f10280aee1e818eb182606f6adaff5f7
-
SSDEEP
3072:lzPkD2B+Yvw3JjpK2ronSqjf5aX50sPCfOP82nSDvJ:lwSOjMqonHjf5aJdKOP3navJ
Malware Config
Signatures
-
Hawkeye family
-
Adds policy Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run AppLaunch.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\run AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" AppLaunch.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\run AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" AppLaunch.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run AppLaunch.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" AppLaunch.exe -
Deletes itself 1 IoCs
pid Process 2316 explorer.exe -
Executes dropped EXE 3 IoCs
pid Process 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe -
Loads dropped DLL 6 IoCs
pid Process 2068 JaffaCakes118_23bc66b499bfc507fd1e14628d90a2cf.exe 2068 JaffaCakes118_23bc66b499bfc507fd1e14628d90a2cf.exe 2316 explorer.exe 2316 explorer.exe 2752 egoi.exe 2752 egoi.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" AppLaunch.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" AppLaunch.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\egoi.exe" egoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2316 set thread context of 2824 2316 explorer.exe 31 PID 3064 set thread context of 2888 3064 wmptvk.exe 34 -
resource yara_rule behavioral1/memory/2824-31-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2824-29-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2824-25-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2824-23-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2824-33-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2824-35-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2824-34-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2824-69-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2824-70-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language egoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptvk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_23bc66b499bfc507fd1e14628d90a2cf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe 2752 egoi.exe 3064 wmptvk.exe 2316 explorer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2068 JaffaCakes118_23bc66b499bfc507fd1e14628d90a2cf.exe Token: SeDebugPrivilege 2316 explorer.exe Token: SeDebugPrivilege 2752 egoi.exe Token: SeDebugPrivilege 3064 wmptvk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2824 AppLaunch.exe 2888 AppLaunch.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2316 2068 JaffaCakes118_23bc66b499bfc507fd1e14628d90a2cf.exe 30 PID 2068 wrote to memory of 2316 2068 JaffaCakes118_23bc66b499bfc507fd1e14628d90a2cf.exe 30 PID 2068 wrote to memory of 2316 2068 JaffaCakes118_23bc66b499bfc507fd1e14628d90a2cf.exe 30 PID 2068 wrote to memory of 2316 2068 JaffaCakes118_23bc66b499bfc507fd1e14628d90a2cf.exe 30 PID 2316 wrote to memory of 2824 2316 explorer.exe 31 PID 2316 wrote to memory of 2824 2316 explorer.exe 31 PID 2316 wrote to memory of 2824 2316 explorer.exe 31 PID 2316 wrote to memory of 2824 2316 explorer.exe 31 PID 2316 wrote to memory of 2824 2316 explorer.exe 31 PID 2316 wrote to memory of 2824 2316 explorer.exe 31 PID 2316 wrote to memory of 2824 2316 explorer.exe 31 PID 2316 wrote to memory of 2824 2316 explorer.exe 31 PID 2316 wrote to memory of 2824 2316 explorer.exe 31 PID 2316 wrote to memory of 2824 2316 explorer.exe 31 PID 2316 wrote to memory of 2824 2316 explorer.exe 31 PID 2316 wrote to memory of 2752 2316 explorer.exe 32 PID 2316 wrote to memory of 2752 2316 explorer.exe 32 PID 2316 wrote to memory of 2752 2316 explorer.exe 32 PID 2316 wrote to memory of 2752 2316 explorer.exe 32 PID 2752 wrote to memory of 3064 2752 egoi.exe 33 PID 2752 wrote to memory of 3064 2752 egoi.exe 33 PID 2752 wrote to memory of 3064 2752 egoi.exe 33 PID 2752 wrote to memory of 3064 2752 egoi.exe 33 PID 3064 wrote to memory of 2888 3064 wmptvk.exe 34 PID 3064 wrote to memory of 2888 3064 wmptvk.exe 34 PID 3064 wrote to memory of 2888 3064 wmptvk.exe 34 PID 3064 wrote to memory of 2888 3064 wmptvk.exe 34 PID 3064 wrote to memory of 2888 3064 wmptvk.exe 34 PID 3064 wrote to memory of 2888 3064 wmptvk.exe 34 PID 3064 wrote to memory of 2888 3064 wmptvk.exe 34 PID 3064 wrote to memory of 2888 3064 wmptvk.exe 34 PID 3064 wrote to memory of 2888 3064 wmptvk.exe 34 PID 3064 wrote to memory of 2888 3064 wmptvk.exe 34 PID 3064 wrote to memory of 2888 3064 wmptvk.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_23bc66b499bfc507fd1e14628d90a2cf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_23bc66b499bfc507fd1e14628d90a2cf.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\System\egoi.exe"C:\Users\Admin\AppData\Local\Temp\System\egoi.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\System\wmptvk.exe"C:\Users\Admin\AppData\Local\Temp\System\wmptvk.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe5⤵
- Adds policy Run key to start application
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD5399528bc0e6739fd2e764f3e8fbebbe8
SHA1736b6f6106c550287dc2ea70dd420c8bcdb4effa
SHA25628f3c005c5efceac2ecc4b1eb396e7d2bce14c83632aad4d7d46cfed2c990a17
SHA512acedb015af54d61b8982204a6881d91ea4ab92e24472631f67ea3ea2caa8711fa779991dce6bbdf9b235b4898fa9619c7ab0998e46154731456be7e179f20eb8
-
Filesize
24KB
MD5fe6ce2eef73a58131a7c5cfcbb69f399
SHA1bdb70a203d915991617ec8d6d9f680faa951b0f3
SHA2561ca2ec0439ef247fb5cceda440a6067f847d225d3f97873916df19c8e4ed3b9e
SHA512f6fbc114b11af201e19b0493145998bc0b6640d7169514c327e22179146c2b8ba805f4d488c493dd8821be330477b6b839ff6c44b08dbc329dcb17e87774f2c9
-
Filesize
128KB
MD523bc66b499bfc507fd1e14628d90a2cf
SHA18a671990a27e718970652c90aeceab5e5fee8fe2
SHA2565b91585b450a0eebcd9e9cde4313725563e981f837d0b0d26446692520e12f9c
SHA512029f9c7189dff322cfe4096b0f210a480c1b30167484eefb9daa5578407c16527cb1d63dfdf9dd84ef330984c82cf731f10280aee1e818eb182606f6adaff5f7