Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
e87698aa73f0f6a591b750463260b5cc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e87698aa73f0f6a591b750463260b5cc_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e87698aa73f0f6a591b750463260b5cc_JaffaCakes118.exe
-
Size
755KB
-
MD5
e87698aa73f0f6a591b750463260b5cc
-
SHA1
dd6451b1e3653e1684ade0368175a61fd24488ab
-
SHA256
d49fbd776674a8cb0e7349ec95629176a893cf62b183dcf584cf69c4b2866e5b
-
SHA512
7b2d51b43a1fb0b31f5502aadf37ef5de92f93f9230b157977b123b34c4f4dc1320b53736aa1f37ef8a08185cc3633b90d3183c3b8ccd4bf3db8a1740f7ebb75
-
SSDEEP
12288:2RyTY+2U4uan/8RdW5A0zyxuJwQ5oAlK+GD/vZuIkAbQQ52LYRg08y5rDRu:C6iU4ucwdW5A2RJr/kB/vcIkA33n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1652 google.com.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\pRogram Files\google.com.exe e87698aa73f0f6a591b750463260b5cc_JaffaCakes118.exe File created C:\pRogram Files\google.com.exe e87698aa73f0f6a591b750463260b5cc_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2868 e87698aa73f0f6a591b750463260b5cc_JaffaCakes118.exe Token: SeDebugPrivilege 1652 google.com.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1652 google.com.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e87698aa73f0f6a591b750463260b5cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e87698aa73f0f6a591b750463260b5cc_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
C:\pRogram Files\google.com.exe"C:\pRogram Files\google.com.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1652
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
755KB
MD5e87698aa73f0f6a591b750463260b5cc
SHA1dd6451b1e3653e1684ade0368175a61fd24488ab
SHA256d49fbd776674a8cb0e7349ec95629176a893cf62b183dcf584cf69c4b2866e5b
SHA5127b2d51b43a1fb0b31f5502aadf37ef5de92f93f9230b157977b123b34c4f4dc1320b53736aa1f37ef8a08185cc3633b90d3183c3b8ccd4bf3db8a1740f7ebb75