Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
01c2f00238201797fcdcfc545936f4d3_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
01c2f00238201797fcdcfc545936f4d3_JaffaCakes118.exe
-
Size
448KB
-
MD5
01c2f00238201797fcdcfc545936f4d3
-
SHA1
655502a2cda80e4bc50e8c8e7402cbf07fd81338
-
SHA256
290a13350c986f0e4f8023eb0e7310ad11394a16ef5a9824cf603264b6c0d49a
-
SHA512
c53c474aaff07428e928697d4abbdd88f4b76b81d5c1eb7c391a1de35badd9500245b3e0e458db5b351a3174efbd227ac4c92132c27443735499a2d2f1b26cb8
-
SSDEEP
12288:QboBb/W9ANGBAFb5i0P6HfewKQLYg0yCx:4xBAiAHwfz
Malware Config
Signatures
-
Dave packer 2 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral1/memory/1732-3-0x0000000001CF0000-0x0000000001D22000-memory.dmp dave behavioral1/memory/1732-7-0x00000000003D0000-0x0000000000400000-memory.dmp dave -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
01c2f00238201797fcdcfc545936f4d3_JaffaCakes118.exepid process 1732 01c2f00238201797fcdcfc545936f4d3_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 552 wermgr.exe Token: SeDebugPrivilege 552 wermgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
01c2f00238201797fcdcfc545936f4d3_JaffaCakes118.exedescription pid process target process PID 1732 wrote to memory of 552 1732 01c2f00238201797fcdcfc545936f4d3_JaffaCakes118.exe wermgr.exe PID 1732 wrote to memory of 552 1732 01c2f00238201797fcdcfc545936f4d3_JaffaCakes118.exe wermgr.exe PID 1732 wrote to memory of 552 1732 01c2f00238201797fcdcfc545936f4d3_JaffaCakes118.exe wermgr.exe PID 1732 wrote to memory of 552 1732 01c2f00238201797fcdcfc545936f4d3_JaffaCakes118.exe wermgr.exe PID 1732 wrote to memory of 552 1732 01c2f00238201797fcdcfc545936f4d3_JaffaCakes118.exe wermgr.exe PID 1732 wrote to memory of 552 1732 01c2f00238201797fcdcfc545936f4d3_JaffaCakes118.exe wermgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01c2f00238201797fcdcfc545936f4d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01c2f00238201797fcdcfc545936f4d3_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/552-200-0x0000000000060000-0x0000000000084000-memory.dmpFilesize
144KB
-
memory/552-202-0x0000000000060000-0x0000000000084000-memory.dmpFilesize
144KB
-
memory/1732-3-0x0000000001CF0000-0x0000000001D22000-memory.dmpFilesize
200KB
-
memory/1732-8-0x0000000001E70000-0x0000000001E9F000-memory.dmpFilesize
188KB
-
memory/1732-7-0x00000000003D0000-0x0000000000400000-memory.dmpFilesize
192KB
-
memory/1732-10-0x0000000001E70000-0x0000000001E9F000-memory.dmpFilesize
188KB
-
memory/1732-9-0x0000000001E40000-0x0000000001E6E000-memory.dmpFilesize
184KB
-
memory/1732-96-0x0000000001E70000-0x0000000001E9F000-memory.dmpFilesize
188KB
-
memory/1732-199-0x0000000010000000-0x0000000010003000-memory.dmpFilesize
12KB
-
memory/1732-198-0x0000000001D30000-0x0000000001D31000-memory.dmpFilesize
4KB
-
memory/1732-201-0x0000000010000000-0x0000000010003000-memory.dmpFilesize
12KB
-
memory/1732-203-0x0000000001E70000-0x0000000001E9F000-memory.dmpFilesize
188KB