Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 16:03
Behavioral task
behavioral1
Sample
2654d2d35ce77f52a2f09784c124f924_JaffaCakes118.msi
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2654d2d35ce77f52a2f09784c124f924_JaffaCakes118.msi
Resource
win10v2004-20240226-en
General
-
Target
2654d2d35ce77f52a2f09784c124f924_JaffaCakes118.msi
-
Size
264KB
-
MD5
2654d2d35ce77f52a2f09784c124f924
-
SHA1
b52bd25fef4dfc4f79f63b45dcf52f9b41babc20
-
SHA256
60ca595c2e8c64cecf7c2f5e1bf9b6d8fa0ca96ba4003daf9681ede62244d35b
-
SHA512
639f306c360b334e56b04058bc1a9ee4ffa4ebc361d45486ba985b225d7d3c31929e51576765e897f20e8f34ff6b06172658e6e2ac7b13e31869987b6a169ad8
-
SSDEEP
3072:QmAk2R903DaYJAkwgz88ereWn/7w05g0zMcB3RUN46ILJ9+ZB5yOanny:Qmn3DaYJAV8er1nzTirIy
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2948 MsiExec.exe 4 2948 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI3488.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3776.tmp msiexec.exe File created C:\Windows\Installer\f763340.msi msiexec.exe File opened for modification C:\Windows\Installer\f763340.msi msiexec.exe -
Loads dropped DLL 2 IoCs
pid Process 2948 MsiExec.exe 2948 MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 2188 msiexec.exe Token: SeIncreaseQuotaPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 1984 msiexec.exe Token: SeTakeOwnershipPrivilege 1984 msiexec.exe Token: SeSecurityPrivilege 1984 msiexec.exe Token: SeCreateTokenPrivilege 2188 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2188 msiexec.exe Token: SeLockMemoryPrivilege 2188 msiexec.exe Token: SeIncreaseQuotaPrivilege 2188 msiexec.exe Token: SeMachineAccountPrivilege 2188 msiexec.exe Token: SeTcbPrivilege 2188 msiexec.exe Token: SeSecurityPrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeLoadDriverPrivilege 2188 msiexec.exe Token: SeSystemProfilePrivilege 2188 msiexec.exe Token: SeSystemtimePrivilege 2188 msiexec.exe Token: SeProfSingleProcessPrivilege 2188 msiexec.exe Token: SeIncBasePriorityPrivilege 2188 msiexec.exe Token: SeCreatePagefilePrivilege 2188 msiexec.exe Token: SeCreatePermanentPrivilege 2188 msiexec.exe Token: SeBackupPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeShutdownPrivilege 2188 msiexec.exe Token: SeDebugPrivilege 2188 msiexec.exe Token: SeAuditPrivilege 2188 msiexec.exe Token: SeSystemEnvironmentPrivilege 2188 msiexec.exe Token: SeChangeNotifyPrivilege 2188 msiexec.exe Token: SeRemoteShutdownPrivilege 2188 msiexec.exe Token: SeUndockPrivilege 2188 msiexec.exe Token: SeSyncAgentPrivilege 2188 msiexec.exe Token: SeEnableDelegationPrivilege 2188 msiexec.exe Token: SeManageVolumePrivilege 2188 msiexec.exe Token: SeImpersonatePrivilege 2188 msiexec.exe Token: SeCreateGlobalPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 1984 msiexec.exe Token: SeTakeOwnershipPrivilege 1984 msiexec.exe Token: SeRestorePrivilege 1984 msiexec.exe Token: SeTakeOwnershipPrivilege 1984 msiexec.exe Token: SeRestorePrivilege 1984 msiexec.exe Token: SeTakeOwnershipPrivilege 1984 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2188 msiexec.exe 2188 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2948 1984 msiexec.exe 29 PID 1984 wrote to memory of 2948 1984 msiexec.exe 29 PID 1984 wrote to memory of 2948 1984 msiexec.exe 29 PID 1984 wrote to memory of 2948 1984 msiexec.exe 29 PID 1984 wrote to memory of 2948 1984 msiexec.exe 29 PID 1984 wrote to memory of 2948 1984 msiexec.exe 29 PID 1984 wrote to memory of 2948 1984 msiexec.exe 29
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\2654d2d35ce77f52a2f09784c124f924_JaffaCakes118.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2188
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1CA0511799530E763C548115D05F5F5B2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD59f1e5d66c2889018daef4aef604eebc4
SHA1b80294261c8a1635e16e14f55a3d76889ff2c857
SHA25602a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222
SHA5128f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b