Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-04-2024 14:29
Behavioral task
behavioral1
Sample
d658fc04f5eb9b2f7984579d4b8d8322_JaffaCakes118.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d658fc04f5eb9b2f7984579d4b8d8322_JaffaCakes118.msi
Resource
win10v2004-20240226-en
General
-
Target
d658fc04f5eb9b2f7984579d4b8d8322_JaffaCakes118.msi
-
Size
264KB
-
MD5
d658fc04f5eb9b2f7984579d4b8d8322
-
SHA1
905e42f62ce86570abd70081185c969574fe64ed
-
SHA256
472e40357bbd9c18824abf10157d6482b8d853cdef7267b723e5d887b54e00ee
-
SHA512
3242e71dd101cbbc54e0136922424f4faf64bdcee2e37adde5ec9247bab30b5c5fcc611c26e9a2816ce56adbb44d4b707363ddbf8f7852563aa308690b9c1adb
-
SSDEEP
3072:vm65Lk903DaYlAYwgz88ereWn/7w05g0dMcB3RUN46ILJ9+ZB5yOanhS:vmo3DaYlAJ8er1nzTMriS
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
MsiExec.exeflow pid Process 3 2632 MsiExec.exe 4 2632 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc Process File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\I: msiexec.exe -
Drops file in Windows directory 4 IoCs
Processes:
msiexec.exedescription ioc Process File opened for modification C:\Windows\Installer\MSI5AAE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5DBB.tmp msiexec.exe File created C:\Windows\Installer\f765966.msi msiexec.exe File opened for modification C:\Windows\Installer\f765966.msi msiexec.exe -
Loads dropped DLL 2 IoCs
Processes:
MsiExec.exepid Process 2632 MsiExec.exe 2632 MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
msiexec.exemsiexec.exedescription pid Process Token: SeShutdownPrivilege 2224 msiexec.exe Token: SeIncreaseQuotaPrivilege 2224 msiexec.exe Token: SeRestorePrivilege 3004 msiexec.exe Token: SeTakeOwnershipPrivilege 3004 msiexec.exe Token: SeSecurityPrivilege 3004 msiexec.exe Token: SeCreateTokenPrivilege 2224 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2224 msiexec.exe Token: SeLockMemoryPrivilege 2224 msiexec.exe Token: SeIncreaseQuotaPrivilege 2224 msiexec.exe Token: SeMachineAccountPrivilege 2224 msiexec.exe Token: SeTcbPrivilege 2224 msiexec.exe Token: SeSecurityPrivilege 2224 msiexec.exe Token: SeTakeOwnershipPrivilege 2224 msiexec.exe Token: SeLoadDriverPrivilege 2224 msiexec.exe Token: SeSystemProfilePrivilege 2224 msiexec.exe Token: SeSystemtimePrivilege 2224 msiexec.exe Token: SeProfSingleProcessPrivilege 2224 msiexec.exe Token: SeIncBasePriorityPrivilege 2224 msiexec.exe Token: SeCreatePagefilePrivilege 2224 msiexec.exe Token: SeCreatePermanentPrivilege 2224 msiexec.exe Token: SeBackupPrivilege 2224 msiexec.exe Token: SeRestorePrivilege 2224 msiexec.exe Token: SeShutdownPrivilege 2224 msiexec.exe Token: SeDebugPrivilege 2224 msiexec.exe Token: SeAuditPrivilege 2224 msiexec.exe Token: SeSystemEnvironmentPrivilege 2224 msiexec.exe Token: SeChangeNotifyPrivilege 2224 msiexec.exe Token: SeRemoteShutdownPrivilege 2224 msiexec.exe Token: SeUndockPrivilege 2224 msiexec.exe Token: SeSyncAgentPrivilege 2224 msiexec.exe Token: SeEnableDelegationPrivilege 2224 msiexec.exe Token: SeManageVolumePrivilege 2224 msiexec.exe Token: SeImpersonatePrivilege 2224 msiexec.exe Token: SeCreateGlobalPrivilege 2224 msiexec.exe Token: SeRestorePrivilege 3004 msiexec.exe Token: SeTakeOwnershipPrivilege 3004 msiexec.exe Token: SeRestorePrivilege 3004 msiexec.exe Token: SeTakeOwnershipPrivilege 3004 msiexec.exe Token: SeRestorePrivilege 3004 msiexec.exe Token: SeTakeOwnershipPrivilege 3004 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid Process 2224 msiexec.exe 2224 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
msiexec.exedescription pid Process procid_target PID 3004 wrote to memory of 2632 3004 msiexec.exe 29 PID 3004 wrote to memory of 2632 3004 msiexec.exe 29 PID 3004 wrote to memory of 2632 3004 msiexec.exe 29 PID 3004 wrote to memory of 2632 3004 msiexec.exe 29 PID 3004 wrote to memory of 2632 3004 msiexec.exe 29 PID 3004 wrote to memory of 2632 3004 msiexec.exe 29 PID 3004 wrote to memory of 2632 3004 msiexec.exe 29
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\d658fc04f5eb9b2f7984579d4b8d8322_JaffaCakes118.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2224
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5653A7C1BA97F181D0D42EA0A4994EA72⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD59f1e5d66c2889018daef4aef604eebc4
SHA1b80294261c8a1635e16e14f55a3d76889ff2c857
SHA25602a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222
SHA5128f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b