Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 13:35
Static task
static1
Behavioral task
behavioral1
Sample
06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe
-
Size
398KB
-
MD5
06de5d7a4d6459a95b3027489fb6c169
-
SHA1
462fbadc94dd49cd20b6b58c34dffaa3d13d49c4
-
SHA256
726efd10333dd1cbd4c65e94122f9e05e3d9ccf0ff1caed8ddb421f37689283c
-
SHA512
09c8954123fb7ed3064ffd9505c11857a406b1451b466100e9b64b5e486b52622f193e2b1587c7cf419fce2185a39fde046602e4fbe71410e9ae85c10d5cb221
-
SSDEEP
12288:IoUKKKEJEePudkcC/OGPQ7f1INHRQEQna:TJKnJxPuqT/GIRFQn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exepid process 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exepid process 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exedescription pid process target process PID 1756 wrote to memory of 2756 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe schtasks.exe PID 1756 wrote to memory of 2756 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe schtasks.exe PID 1756 wrote to memory of 2756 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe schtasks.exe PID 1756 wrote to memory of 2756 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe schtasks.exe PID 1756 wrote to memory of 1832 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe PID 1756 wrote to memory of 1832 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe PID 1756 wrote to memory of 1832 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe PID 1756 wrote to memory of 1832 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe PID 1756 wrote to memory of 2620 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe PID 1756 wrote to memory of 2620 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe PID 1756 wrote to memory of 2620 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe PID 1756 wrote to memory of 2620 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe PID 1756 wrote to memory of 2620 1756 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe 06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wkrYXmSmSPPhL" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC37E.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06de5d7a4d6459a95b3027489fb6c169_JaffaCakes118.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1756-0-0x0000000000150000-0x00000000001BA000-memory.dmpFilesize
424KB
-
memory/1756-1-0x0000000074360000-0x0000000074A4E000-memory.dmpFilesize
6.9MB
-
memory/1756-2-0x0000000004C40000-0x0000000004C80000-memory.dmpFilesize
256KB
-
memory/1756-3-0x0000000004C40000-0x0000000004C80000-memory.dmpFilesize
256KB
-
memory/1756-4-0x00000000005A0000-0x00000000005AE000-memory.dmpFilesize
56KB
-
memory/1756-5-0x0000000074360000-0x0000000074A4E000-memory.dmpFilesize
6.9MB
-
memory/1756-6-0x0000000004C40000-0x0000000004C80000-memory.dmpFilesize
256KB
-
memory/1756-7-0x0000000004C40000-0x0000000004C80000-memory.dmpFilesize
256KB
-
memory/1756-8-0x0000000004C40000-0x0000000004C80000-memory.dmpFilesize
256KB
-
memory/1756-9-0x0000000005E70000-0x0000000005ED0000-memory.dmpFilesize
384KB
-
memory/2620-15-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2620-17-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB