Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
c3a9000fb5550b758eaa9c4328386d90_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3a9000fb5550b758eaa9c4328386d90_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
c3a9000fb5550b758eaa9c4328386d90_JaffaCakes118.exe
-
Size
4.2MB
-
MD5
c3a9000fb5550b758eaa9c4328386d90
-
SHA1
479da0354581b62c63f23d849ed559c9eecb6b82
-
SHA256
75c2b8705c94baf36545a2c8cae4d5079a54beca1caae150f120429080a72f13
-
SHA512
5f8fea9e7b451e33ec018a5d68bbf476e452bd41687f59ac865a15da1276ec8f148bc9b1a2a1436fa78e4b5845a8f2e29d9296f62c8c1a8dd320bc43db44368d
-
SSDEEP
98304:mhFtXB4uluJRmMg6QWlIpgi0rHqsih/mCqZB4uluy:IvsJR0TW6yiIKRhzqtsy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2872 UEN6O.exe -
Executes dropped EXE 1 IoCs
pid Process 2872 UEN6O.exe -
Loads dropped DLL 2 IoCs
pid Process 2328 c3a9000fb5550b758eaa9c4328386d90_JaffaCakes118.exe 2872 UEN6O.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2328 c3a9000fb5550b758eaa9c4328386d90_JaffaCakes118.exe Token: 0 2328 c3a9000fb5550b758eaa9c4328386d90_JaffaCakes118.exe Token: SeDebugPrivilege 2872 UEN6O.exe Token: 0 2872 UEN6O.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2872 2328 c3a9000fb5550b758eaa9c4328386d90_JaffaCakes118.exe 28 PID 2328 wrote to memory of 2872 2328 c3a9000fb5550b758eaa9c4328386d90_JaffaCakes118.exe 28 PID 2328 wrote to memory of 2872 2328 c3a9000fb5550b758eaa9c4328386d90_JaffaCakes118.exe 28 PID 2872 wrote to memory of 2528 2872 UEN6O.exe 29 PID 2872 wrote to memory of 2528 2872 UEN6O.exe 29 PID 2872 wrote to memory of 2528 2872 UEN6O.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3a9000fb5550b758eaa9c4328386d90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c3a9000fb5550b758eaa9c4328386d90_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\UEN6O.exe"C:\Users\Admin\AppData\Local\Temp\UEN6O.exe" -Continue|"C:\Users\Admin\AppData\Local\Temp\c3a9000fb5550b758eaa9c4328386d90_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2872 -s 9443⤵PID:2528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD55a8e8dedf1d910c79defff5638978d07
SHA1bfab518af8a53f02c4f98fc321aa0984a208686c
SHA256d5bf8619a6f47e74aceb629da039f25493b0b8fb2f892bda2b32bd68c0cf8893
SHA5127acfc4d0bde75a518f394319c8cd6743d36eb7ebcdcd26eeae2fb59ead70bb8b4d2fb29be93c89b529775f8a407a9bcd6e4d2a2955c03b15f2880ff9aa61a519
-
Filesize
4.2MB
MD50cd42334f685fe369310bdb0c164cdb5
SHA1158747fac3a421c6e6cd08087a9c62554265b548
SHA256483d6459ec51240b7d9ab1eed2ff759057c3628ac392ac3991aa899bd615b6a4
SHA5125a280986c834141f837bc9ebec820dafabd5d86598a84ff876851f439337c28edada86815d7d9b639c5ca761966971882819074416968ea18537f4a10a61863c
-
Filesize
1.3MB
MD5a70486cf41bf065ff8e76e8619745361
SHA1e06e75380b17fec737fbdfeaa4a09b83e54d4838
SHA2561563fc1966e779f0fcb71753f15e73ec770e169a0ad6e3c5af736764d9bd5858
SHA51202f1c909fcbf7c0f5604ccb4e807640d80a2236c3cac6975e2e849bda318419e7188bb6a48184940eb381e2af375c83d7539e58951edf5e49ec11dd0cff66cc0