Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
da41f488f7ec9dcfff69d10ea1a1eb76_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
da41f488f7ec9dcfff69d10ea1a1eb76_JaffaCakes118.exe
-
Size
157KB
-
MD5
da41f488f7ec9dcfff69d10ea1a1eb76
-
SHA1
2131a4593c68f4975804a27c401772d1c16326d9
-
SHA256
28f06a9f52d1f3c9d63f78aa1f20a2c61940ba43bc2a93418b6e622771fc6051
-
SHA512
cc55b3ceb141c43215b3bb5eb002218de01f89722b9e75792c005dc1d2c8004b55d52a4cbfcdb2ca076c74e2f4a5de50c42fc0b92798e39c850f4d5888408039
-
SSDEEP
3072:2/uqIFOmpEx7P/goN7Jd3hbXpMCCpr2Leh/1uDAmhpf+:mx7AoNNxhpMCCx2LwuDhhpf
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1344 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 3004 WindowsServices.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\WindowsServices.exe da41f488f7ec9dcfff69d10ea1a1eb76_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe Token: 33 3004 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3004 WindowsServices.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1664 wrote to memory of 3004 1664 da41f488f7ec9dcfff69d10ea1a1eb76_JaffaCakes118.exe 28 PID 1664 wrote to memory of 3004 1664 da41f488f7ec9dcfff69d10ea1a1eb76_JaffaCakes118.exe 28 PID 1664 wrote to memory of 3004 1664 da41f488f7ec9dcfff69d10ea1a1eb76_JaffaCakes118.exe 28 PID 1664 wrote to memory of 3004 1664 da41f488f7ec9dcfff69d10ea1a1eb76_JaffaCakes118.exe 28 PID 3004 wrote to memory of 1344 3004 WindowsServices.exe 29 PID 3004 wrote to memory of 1344 3004 WindowsServices.exe 29 PID 3004 wrote to memory of 1344 3004 WindowsServices.exe 29 PID 3004 wrote to memory of 1344 3004 WindowsServices.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\da41f488f7ec9dcfff69d10ea1a1eb76_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da41f488f7ec9dcfff69d10ea1a1eb76_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\WindowsServices.exe"C:\Windows\WindowsServices.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\WindowsServices.exe" "WindowsServices.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1344
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD5da41f488f7ec9dcfff69d10ea1a1eb76
SHA12131a4593c68f4975804a27c401772d1c16326d9
SHA25628f06a9f52d1f3c9d63f78aa1f20a2c61940ba43bc2a93418b6e622771fc6051
SHA512cc55b3ceb141c43215b3bb5eb002218de01f89722b9e75792c005dc1d2c8004b55d52a4cbfcdb2ca076c74e2f4a5de50c42fc0b92798e39c850f4d5888408039