Analysis
-
max time kernel
119s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
f432143eef13263ec5956b7db2242c2a
-
SHA1
61cfba11d6e0ceac08a8e2afc43d0fd1afa8b9b6
-
SHA256
98d74cdbcf31e2166ee1beca480bb0110278ab7ae76a5355d5fd6d63b909f101
-
SHA512
7ab0d95e77aec8fe913872cd30badcb1e6fe43676fb4e48429cd13272f9e2969f38704cfe7a2093657c6bb5e41d10dc57de6f3a3440348e7e8e11f6503d54ccd
-
SSDEEP
49152:O9AmFHzPIldt9QFm0yfR0MRhYHAoniaq01LOXLtF81o:OCZldQyHhYbBd1L0XAo
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\autoruning.ini.lnk f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 client32.exe -
Loads dropped DLL 8 IoCs
pid Process 2256 f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe 2256 f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe 2700 client32.exe 2700 client32.exe 2700 client32.exe 2700 client32.exe 2700 client32.exe 2700 client32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2700 client32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 client32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2700 2256 f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe 28 PID 2256 wrote to memory of 2700 2256 f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe 28 PID 2256 wrote to memory of 2700 2256 f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe 28 PID 2256 wrote to memory of 2700 2256 f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe 28 PID 2256 wrote to memory of 2700 2256 f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe 28 PID 2256 wrote to memory of 2700 2256 f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe 28 PID 2256 wrote to memory of 2700 2256 f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f432143eef13263ec5956b7db2242c2a_JaffaCakes118.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Roaming\WinSupport\client32.exe"C:\Users\Admin\AppData\Roaming\WinSupport\client32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD52d3b207c8a48148296156e5725426c7f
SHA1ad464eb7cf5c19c8a443ab5b590440b32dbc618f
SHA256edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796
SHA51255c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
254B
MD58614c2008044a081e9d26d8db1571f4a
SHA11b007f05c289d0b71d542520b25fe65c6b6fcbe3
SHA256df622fc8bc605023730d3ad952d69fcbd8383ce5440d63da0df20fb139355ec9
SHA512449244a508daaacde53078b826f7b482650acc3f61e8235fa892a737bebbecb178061d0aa1e99cd74da7885c86cebb2727d6e85384ecd68187d7e6e94f018ae9
-
Filesize
3.6MB
MD500587238d16012152c2e951a087f2cc9
SHA1c4e27a43075ce993ff6bb033360af386b2fc58ff
SHA25663aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8
SHA512637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226
-
Filesize
387KB
MD5eab603d12705752e3d268d86dff74ed4
SHA101873977c871d3346d795cf7e3888685de9f0b16
SHA2566795d760ce7a955df6c2f5a062e296128efdb8c908908eda4d666926980447ea
SHA51277de0d9c93ccba967db70b280a85a770b3d8bea3b707b1abb037b2826b48898fec87924e1a6cce218c43478e5209e9eb9781051b4c3b450bea3cd27dbd32c7f3
-
Filesize
794B
MD53e1091fb68b2eaab01c9f9eda3ade904
SHA1538b61edb240fccec0916660b2c799b3f446f1f3
SHA256148b6762e0599abf5413f10a4acea4e5d15125614420da73f4853f8882eaefee
SHA512880cf5212cc44444ea3796384d9636bec0dae4af4257eb6678119fbaf90f115ef8b772bb46d6a9ee934756dc47af11aba9b2d23a8a28a723cad14929e3c981be
-
Filesize
32KB
MD5dcde2248d19c778a41aa165866dd52d0
SHA17ec84be84fe23f0b0093b647538737e1f19ebb03
SHA2569074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917
SHA512c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166
-
Filesize
18KB
MD5a0b9388c5f18e27266a31f8c5765b263
SHA1906f7e94f841d464d4da144f7c858fa2160e36db
SHA256313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a
SHA5126051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd
-
Filesize
104KB
MD5f76954b68cc390f8009f1a052283a740
SHA13112a39aad950045d6422fb2abe98bed05931e6c
SHA25663315df7981130853d75dc753e5776bdf371811bcfce351557c1e45afdd1ebfb
SHA512d3aea0867b488161f62e43e7c250ad3917713b8b183139fb6e06c71594fb0cec769e1494b7cc257117992ae4aa891e056f99c25431ae19f032b1ba779051a880