Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
ed23abcbc1b29979d493f96e81949c19_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ed23abcbc1b29979d493f96e81949c19_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ed23abcbc1b29979d493f96e81949c19_JaffaCakes118.exe
-
Size
457KB
-
MD5
ed23abcbc1b29979d493f96e81949c19
-
SHA1
8c24f0fa686a138e8201111d1cb27e51a07aa21e
-
SHA256
f37b886af5ac967a930182530840f9aa8d8a23d8ad2bae1b707fd5c341ba115f
-
SHA512
879f6c42ccc307996ea0dddb403298524e5e9675cc842461a614b9a995bc3270d9d40bca4c5f9ddeb0d23b2e6a84b350af3ff3354df590b0913304141656cfd7
-
SSDEEP
6144:5XS4qa4kF2muihncrFUhySHWPvANVHi1kvGPre7mFsjcLtJewrsacT+dPuOFZUkF:5OyVDnK0ySHAvKU1C6GnutJsoZauy1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3676 winine.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\winine.exe ed23abcbc1b29979d493f96e81949c19_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winine.exe ed23abcbc1b29979d493f96e81949c19_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winine.exe winine.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1556 3708 WerFault.exe 89 3552 3676 WerFault.exe 95 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3708 ed23abcbc1b29979d493f96e81949c19_JaffaCakes118.exe Token: SeDebugPrivilege 3676 winine.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed23abcbc1b29979d493f96e81949c19_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed23abcbc1b29979d493f96e81949c19_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 2202⤵
- Program crash
PID:1556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3708 -ip 37081⤵PID:1408
-
C:\Windows\SysWOW64\winine.exeC:\Windows\SysWOW64\winine.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 2162⤵
- Program crash
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3676 -ip 36761⤵PID:1448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:81⤵PID:3888
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD5ed23abcbc1b29979d493f96e81949c19
SHA18c24f0fa686a138e8201111d1cb27e51a07aa21e
SHA256f37b886af5ac967a930182530840f9aa8d8a23d8ad2bae1b707fd5c341ba115f
SHA512879f6c42ccc307996ea0dddb403298524e5e9675cc842461a614b9a995bc3270d9d40bca4c5f9ddeb0d23b2e6a84b350af3ff3354df590b0913304141656cfd7