Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 16:08
Behavioral task
behavioral1
Sample
JaffaCakes118_98e3d2086ee5c43d9faf801af4a7cbdb.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_98e3d2086ee5c43d9faf801af4a7cbdb.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_98e3d2086ee5c43d9faf801af4a7cbdb.exe
-
Size
24KB
-
MD5
98e3d2086ee5c43d9faf801af4a7cbdb
-
SHA1
826fd0cee8ae48bf3ec914208fb7e49e773403d8
-
SHA256
c475fed2f6ba0ac3c67cf84d39fe08956bd72be6857a6f5d047949c46119e44c
-
SHA512
10bcd7590cec8f1a7f92fa9bd0f0008813aa77ba66c662013b046af5ab4d74a2ea58dc4dc51ba87a8078bfd5620d43d50c2e4e5a06a443aa9f4671cc9dcab155
-
SSDEEP
384:Pp6CE6rdOhM0qufXwxZsN/YYj5BTMkUMpM1dUr2RqTwleANiW8T/7cE4:hbdOhM0TfgjsRYmNMuwRRqTxNrP
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{12345678-b1gf-14d0-89bb-0090ce808666} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{12345678-b1gf-14d0-89bb-0090ce808666}\StubPath = "C:\\WINDOWS\\system32\\mhzx.bat" regedit.exe -
Deletes itself 1 IoCs
pid Process 2924 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 gameclien.exe -
Loads dropped DLL 6 IoCs
pid Process 2924 cmd.exe 2924 cmd.exe 2192 gameclien.exe 2192 gameclien.exe 2192 gameclien.exe 2192 gameclien.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\mhzx.bat gameclien.exe File created C:\WINDOWS\SysWOW64\mhzx.reg gameclien.exe File created C:\WINDOWS\SysWOW64\mhzxin.bat gameclien.exe File created C:\WINDOWS\SysWOW64\sougou.ime gameclien.exe -
resource yara_rule behavioral1/memory/2596-10-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/files/0x0007000000015d79-15.dat upx behavioral1/memory/2192-38-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2596-0-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WLmhzx\gameclien.exe JaffaCakes118_98e3d2086ee5c43d9faf801af4a7cbdb.exe File opened for modification C:\Program Files\WLmhzx\gameclien.exe JaffaCakes118_98e3d2086ee5c43d9faf801af4a7cbdb.exe File created C:\Program Files\WLmhzx\jietu.exe gameclien.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e3d2086ee5c43d9faf801af4a7cbdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gameclien.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2932 regedit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2596 JaffaCakes118_98e3d2086ee5c43d9faf801af4a7cbdb.exe 2192 gameclien.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2924 2596 JaffaCakes118_98e3d2086ee5c43d9faf801af4a7cbdb.exe 30 PID 2596 wrote to memory of 2924 2596 JaffaCakes118_98e3d2086ee5c43d9faf801af4a7cbdb.exe 30 PID 2596 wrote to memory of 2924 2596 JaffaCakes118_98e3d2086ee5c43d9faf801af4a7cbdb.exe 30 PID 2596 wrote to memory of 2924 2596 JaffaCakes118_98e3d2086ee5c43d9faf801af4a7cbdb.exe 30 PID 2924 wrote to memory of 2192 2924 cmd.exe 32 PID 2924 wrote to memory of 2192 2924 cmd.exe 32 PID 2924 wrote to memory of 2192 2924 cmd.exe 32 PID 2924 wrote to memory of 2192 2924 cmd.exe 32 PID 2192 wrote to memory of 2788 2192 gameclien.exe 33 PID 2192 wrote to memory of 2788 2192 gameclien.exe 33 PID 2192 wrote to memory of 2788 2192 gameclien.exe 33 PID 2192 wrote to memory of 2788 2192 gameclien.exe 33 PID 2788 wrote to memory of 2932 2788 cmd.exe 35 PID 2788 wrote to memory of 2932 2788 cmd.exe 35 PID 2788 wrote to memory of 2932 2788 cmd.exe 35 PID 2788 wrote to memory of 2932 2788 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e3d2086ee5c43d9faf801af4a7cbdb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e3d2086ee5c43d9faf801af4a7cbdb.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c 1.bat2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files\WLmhzx\gameclien.exe"C:\Program Files\WLmhzx\gameclien.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd /c C:\WINDOWS\system32\mhzxin.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s mhzx.reg5⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2932
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD598e3d2086ee5c43d9faf801af4a7cbdb
SHA1826fd0cee8ae48bf3ec914208fb7e49e773403d8
SHA256c475fed2f6ba0ac3c67cf84d39fe08956bd72be6857a6f5d047949c46119e44c
SHA51210bcd7590cec8f1a7f92fa9bd0f0008813aa77ba66c662013b046af5ab4d74a2ea58dc4dc51ba87a8078bfd5620d43d50c2e4e5a06a443aa9f4671cc9dcab155
-
Filesize
192B
MD50c018c557a2f3e38ba6f8abd7a6ab654
SHA129f8a3d566ca63eef56e34b1da883c662ec15b63
SHA256443ede70b2034e790afa0fd6f57d3ee115a3e6ea94e52223a67ad3d4532f31e9
SHA512dc723214ad4497ac3b0588e46fdef409516bdde28a1a447f3668892433eb500ffb6dc0e46e8573c055962f1f733a53ef69be7153a6fe6d07d3fa123b0892aa0a
-
Filesize
312B
MD5f0e79459e4b4ffcc8cb8b3e718fac9ff
SHA1723bc34d7fad62fc56920d77f0a58fabe57ce049
SHA2565c665746ab27624fa6b072e04aec98c0ffd8d78bdfa1efd67eeff92dce8dcb66
SHA512f8e394b54f0bb81be13db5b07543bb21372b461ee02499fb58f60b8216f6b24b8ad27381f7a494e67e7c4c31d285dfdfbb5cb89b604819351626e3a05c36d2ad
-
Filesize
23B
MD540ad273cddf8d446a6970e58e36c861e
SHA10096494c0a50ee9404e151ba9b0f22d14bbc2a30
SHA256061b674b67a39109110ee8ff1b00e16e722edc6e6a16e6cb3183091015ec4e97
SHA5126aee175080408d992fc16ab260631696757670f0525dd56ae54994b08e63a6858d496a70241a84ea859d7a05ceab5acadea3880926af7052c7652755bdb03edf
-
Filesize
36KB
MD5b246f8da3f34c2b59e1ba8f147c7001b
SHA14294f29b4a2dcc4561dad6209f3ffa0a00b22e41
SHA256cf93ff1f3a924712706fd9e9539a1be1ec173121ef5a8d9aad8489fb8acf7786
SHA512b8535b431413dbbd22182d69fdef3bb42e0105eb7938eef066be995848a061c27d57e8086523e9335237d723ee34fe41f76787d2effd105885122b6f7feba250