Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
eb17b723b28579315fc03073c1f8e4cf_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb17b723b28579315fc03073c1f8e4cf_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eb17b723b28579315fc03073c1f8e4cf_JaffaCakes118.exe
-
Size
216KB
-
MD5
eb17b723b28579315fc03073c1f8e4cf
-
SHA1
dda74dbd20cd18a6e80ff0534b5a974015e31cae
-
SHA256
9ddb12d5dfdadf13ebbf61e28aea41dd4b169db1c10b1fef4a47714975264f30
-
SHA512
20ec1372100f87c5b44a89cbb0506aafad3cc375c9344f2e70ccf715f2dafa4cd42f8facc61d046ab47f37ba8ade53a584275f588444c7065a3464b468c7ff10
-
SSDEEP
3072:vQchQBaK6mtcS2MDe2bBW0qmjYo7vq3+ammvaqR0YaF9dYSi7oHr2zTQhHlYTmX5:vjcaK6mtc1YWdxX3EmvhQNi7G2ytGO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2452 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 lmkqgk.exe -
Loads dropped DLL 4 IoCs
pid Process 2452 cmd.exe 2452 cmd.exe 2564 lmkqgk.exe 2564 lmkqgk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2496 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2844 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2564 lmkqgk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2496 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2564 lmkqgk.exe 2564 lmkqgk.exe 2564 lmkqgk.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2564 lmkqgk.exe 2564 lmkqgk.exe 2564 lmkqgk.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2452 2248 eb17b723b28579315fc03073c1f8e4cf_JaffaCakes118.exe 28 PID 2248 wrote to memory of 2452 2248 eb17b723b28579315fc03073c1f8e4cf_JaffaCakes118.exe 28 PID 2248 wrote to memory of 2452 2248 eb17b723b28579315fc03073c1f8e4cf_JaffaCakes118.exe 28 PID 2248 wrote to memory of 2452 2248 eb17b723b28579315fc03073c1f8e4cf_JaffaCakes118.exe 28 PID 2452 wrote to memory of 2496 2452 cmd.exe 30 PID 2452 wrote to memory of 2496 2452 cmd.exe 30 PID 2452 wrote to memory of 2496 2452 cmd.exe 30 PID 2452 wrote to memory of 2496 2452 cmd.exe 30 PID 2452 wrote to memory of 2844 2452 cmd.exe 32 PID 2452 wrote to memory of 2844 2452 cmd.exe 32 PID 2452 wrote to memory of 2844 2452 cmd.exe 32 PID 2452 wrote to memory of 2844 2452 cmd.exe 32 PID 2452 wrote to memory of 2564 2452 cmd.exe 33 PID 2452 wrote to memory of 2564 2452 cmd.exe 33 PID 2452 wrote to memory of 2564 2452 cmd.exe 33 PID 2452 wrote to memory of 2564 2452 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb17b723b28579315fc03073c1f8e4cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb17b723b28579315fc03073c1f8e4cf_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2248 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\eb17b723b28579315fc03073c1f8e4cf_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\lmkqgk.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 22483⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2844
-
-
C:\Users\Admin\AppData\Local\lmkqgk.exeC:\Users\Admin\AppData\Local\lmkqgk.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5eb17b723b28579315fc03073c1f8e4cf
SHA1dda74dbd20cd18a6e80ff0534b5a974015e31cae
SHA2569ddb12d5dfdadf13ebbf61e28aea41dd4b169db1c10b1fef4a47714975264f30
SHA51220ec1372100f87c5b44a89cbb0506aafad3cc375c9344f2e70ccf715f2dafa4cd42f8facc61d046ab47f37ba8ade53a584275f588444c7065a3464b468c7ff10