Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 08:38
Static task
static1
Behavioral task
behavioral1
Sample
f31be52d67a474a2d7cec9a0a6693d2b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f31be52d67a474a2d7cec9a0a6693d2b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f31be52d67a474a2d7cec9a0a6693d2b_JaffaCakes118.exe
-
Size
142KB
-
MD5
f31be52d67a474a2d7cec9a0a6693d2b
-
SHA1
f677c22a2e0f0758e730e6a88ba28bac59b1ca36
-
SHA256
c7aba82ea67ce033a0c2bd82bc4328f86cad5fdd822304d0227f1e05ac55bde5
-
SHA512
17429dae759a8c91c7fd62dd7eebc54b9ab4fa426756d43e50853eda43eb007d7ce1fbb07bcb993898adc75cb5da93d96dd69eaffcbf74a7cfa325e3793edf64
-
SSDEEP
3072:A8BrIXhKqCnqXf8niLtXJ/SYkyj4FxMKgObqL6f:A20XonqXfwiLt1SZyjgSOa
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3016 f31be52d67a474a2d7cec9a0a6693d2b_JaffaCakes118.exe 3016 f31be52d67a474a2d7cec9a0a6693d2b_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sporder.dll f31be52d67a474a2d7cec9a0a6693d2b_JaffaCakes118.exe File created \??\c:\windows\SysWOW64\rsvp322.dll f31be52d67a474a2d7cec9a0a6693d2b_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 3016 f31be52d67a474a2d7cec9a0a6693d2b_JaffaCakes118.exe 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 3016 f31be52d67a474a2d7cec9a0a6693d2b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3016 f31be52d67a474a2d7cec9a0a6693d2b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f31be52d67a474a2d7cec9a0a6693d2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f31be52d67a474a2d7cec9a0a6693d2b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3016
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5915540aaa35261103442e26bfba772e3
SHA1b8cca8f6e32c7fe7dbaf4ddb069b231c31ba38d2
SHA2569b8ec0bf96a387b9a6c3101d30876337ca0eb60b79a692aca02d77b32e1f9c27
SHA5126fadea1452e99e5fd9a5ac604d3b68edd7bae82b461afea4e3944c0fd9071a35d265577b384f15838b7f905859a676861c1d2f541a58714f2cf3b54e25c96005
-
Filesize
8KB
MD5a082e5473b2a9a4d846ed7ddf637ac76
SHA11703f7969a6e76f8458eda3e8e40fd115c0bfdc3
SHA25673f7171c2af70ccf8ee4c49626fb456807a6a668f6a967298dcd5ed29773bd2a
SHA512abc1ea5a46d0784db23ddd9bd984527913c3e40a3896cfa43e9f4f999e4064038b24aed78e27bf2e705c8c55482e801f520987c2a74be6f01edc32df3d235eaa