Resubmissions
10/04/2024, 05:34
240410-f9shssha71 610/04/2024, 05:34
240410-f9rw9sdh27 610/04/2024, 05:34
240410-f9raqsha7w 610/04/2024, 05:34
240410-f9qzzadh24 601/04/2024, 07:59
240401-jvlcqaha5w 701/04/2024, 07:58
240401-jt2y3sha3y 601/04/2024, 07:57
240401-jthkfaha2v 601/04/2024, 07:53
240401-jrfytsgh6w 601/04/2024, 07:26
240401-h9vdhagd9w 701/04/2024, 07:23
240401-h777ksgh22 6Analysis
-
max time kernel
1762s -
max time network
1783s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
08456d53df6abf9812cf4549b3b582ea_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
08456d53df6abf9812cf4549b3b582ea_JaffaCakes118.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
08456d53df6abf9812cf4549b3b582ea_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
08456d53df6abf9812cf4549b3b582ea_JaffaCakes118.exe
Resource
win11-20240319-en
General
-
Target
08456d53df6abf9812cf4549b3b582ea_JaffaCakes118.exe
-
Size
131KB
-
MD5
08456d53df6abf9812cf4549b3b582ea
-
SHA1
500c86eb1e89469dd226f3d664e860f7676a9225
-
SHA256
8883cc13e0f391979e828931e59168cd8bdb1814598323622a51f85ab302f3f8
-
SHA512
40125b077f5485be87e6cfb1339651baae342046dc34ed9a5b97541486006511c959ebe89651a0264dd761167886843c6cc597b359cb8384675696999ff3c52b
-
SSDEEP
1536:BL+O/U7OBmKGS6CBK0t/ZCXPGuxgDM5YKBGNc/xf6KWcs8+SUkIcekqY1o/uImzk:BLxUyjp3xCTyDMsUWyw+Ubx7NR
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mhgutypzru = "C:\\Users\\Admin\\AppData\\Local\\Temp\\08456d53df6abf9812cf4549b3b582ea_JaffaCakes118.exe" 08456d53df6abf9812cf4549b3b582ea_JaffaCakes118.exe -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2520 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08456d53df6abf9812cf4549b3b582ea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08456d53df6abf9812cf4549b3b582ea_JaffaCakes118.exe"1⤵
- Adds Run key to start application
PID:4124
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:864
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5bb91d0bfe6d262901beb6ded30a52310
SHA11f2cae19529fdbbda924802190f17d43b92d8799
SHA25627ea6c6fb871b3751d814ca3b140feda45c6138792621a04cfba3a69f8bbc77b
SHA512ca2d4aa400ec7de3661f1d6c01586c3937cfdb89b29230bcd5ccd688330cb375a310e9f19bd55018f84df29f6ed4de2888ba190064a617a4d27d4e3a47e7f359