Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/04/2024, 10:34
Static task
static1
Behavioral task
behavioral1
Sample
e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe
-
Size
143KB
-
MD5
e257a039b60b287a30e4658ff14ceaa1
-
SHA1
b2f81dd80056acea62bb2202dd11d075b9e4e73d
-
SHA256
d66c3d6aa4a0ed92db2569589242ec14e60bc5fc0a459242cd02f50c1af0b70b
-
SHA512
27dbad4066e5786ba0274c164127d03df31d9e8be40f465aa3488cb93069679c3e5c923f52273d5ccc2854ece7f1e676f80045f24f89af092a8f70b7042489ae
-
SSDEEP
3072:rDCmErwR/+UIVnbsFC2W5C2BzG2lPwIfmbSBeRdJs:rDCFrwR/+7b0u5L0uPwIebDRA
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 1644 powershell.exe 2524 powershell.exe 2876 powershell.exe 2008 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe Token: SeDebugPrivilege 1644 powershell.exe Token: SeDebugPrivilege 2524 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 2008 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2192 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 28 PID 2196 wrote to memory of 2192 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 28 PID 2196 wrote to memory of 2192 2196 e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe 28 PID 2192 wrote to memory of 1644 2192 cmd.exe 30 PID 2192 wrote to memory of 1644 2192 cmd.exe 30 PID 2192 wrote to memory of 1644 2192 cmd.exe 30 PID 2192 wrote to memory of 2524 2192 cmd.exe 31 PID 2192 wrote to memory of 2524 2192 cmd.exe 31 PID 2192 wrote to memory of 2524 2192 cmd.exe 31 PID 2192 wrote to memory of 2876 2192 cmd.exe 32 PID 2192 wrote to memory of 2876 2192 cmd.exe 32 PID 2192 wrote to memory of 2876 2192 cmd.exe 32 PID 2192 wrote to memory of 2008 2192 cmd.exe 33 PID 2192 wrote to memory of 2008 2192 cmd.exe 33 PID 2192 wrote to memory of 2008 2192 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e257a039b60b287a30e4658ff14ceaa1_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Z6O5N4NX4RJUSUHCHOCI.temp
Filesize7KB
MD592973342f619f463111c84ac617ad268
SHA18434549cc9442c7db8513169c617618e9b1e7d4f
SHA2566bcf6d15b034780e73f861c7447b1daef4c8b0e7837233239213690e03c8705a
SHA51242a926b0b2cd538c3c82e6a27f3542cc51a02a174cbc9cd2bf719caf3bbcbac50b589e8310fd598e3a75012a12b323fd2e0d7be06428361f2168a2ee64be6fab