Analysis
-
max time kernel
55s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 03:09
Static task
static1
Behavioral task
behavioral1
Sample
043eb8f5c9b206850f07b8ec3af4ec30_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
043eb8f5c9b206850f07b8ec3af4ec30_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/rfdyb.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/rfdyb.dll
Resource
win10v2004-20240226-en
General
-
Target
043eb8f5c9b206850f07b8ec3af4ec30_JaffaCakes118.exe
-
Size
558KB
-
MD5
043eb8f5c9b206850f07b8ec3af4ec30
-
SHA1
4c5cb03739d957bec3d529367cc43ef0e86d84a5
-
SHA256
7427de023cb40d7a221e87ed9b1967200cf2961a60f41ccf4b5a8abcf2214e4a
-
SHA512
351e55eeaccfd2bc0bbc5b8928d7401bab350c791cfffdb8f43b5e433e5a4b73ef61510e5ddaa590b366661eb9f29925fc5cbcbcb2a8f911f04dfc41286834f4
-
SSDEEP
12288:X0vCdodaQCc/ZhnbGRUD9g6JkukaakaLSTFDv:X0vRaDOZhnbGigIkuQtLyN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2936 ebhcabfbbjbgd.exe -
Loads dropped DLL 2 IoCs
pid Process 4800 043eb8f5c9b206850f07b8ec3af4ec30_JaffaCakes118.exe 4800 043eb8f5c9b206850f07b8ec3af4ec30_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1136 2936 WerFault.exe 83 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4360 wmic.exe Token: SeSecurityPrivilege 4360 wmic.exe Token: SeTakeOwnershipPrivilege 4360 wmic.exe Token: SeLoadDriverPrivilege 4360 wmic.exe Token: SeSystemProfilePrivilege 4360 wmic.exe Token: SeSystemtimePrivilege 4360 wmic.exe Token: SeProfSingleProcessPrivilege 4360 wmic.exe Token: SeIncBasePriorityPrivilege 4360 wmic.exe Token: SeCreatePagefilePrivilege 4360 wmic.exe Token: SeBackupPrivilege 4360 wmic.exe Token: SeRestorePrivilege 4360 wmic.exe Token: SeShutdownPrivilege 4360 wmic.exe Token: SeDebugPrivilege 4360 wmic.exe Token: SeSystemEnvironmentPrivilege 4360 wmic.exe Token: SeRemoteShutdownPrivilege 4360 wmic.exe Token: SeUndockPrivilege 4360 wmic.exe Token: SeManageVolumePrivilege 4360 wmic.exe Token: 33 4360 wmic.exe Token: 34 4360 wmic.exe Token: 35 4360 wmic.exe Token: 36 4360 wmic.exe Token: SeIncreaseQuotaPrivilege 4360 wmic.exe Token: SeSecurityPrivilege 4360 wmic.exe Token: SeTakeOwnershipPrivilege 4360 wmic.exe Token: SeLoadDriverPrivilege 4360 wmic.exe Token: SeSystemProfilePrivilege 4360 wmic.exe Token: SeSystemtimePrivilege 4360 wmic.exe Token: SeProfSingleProcessPrivilege 4360 wmic.exe Token: SeIncBasePriorityPrivilege 4360 wmic.exe Token: SeCreatePagefilePrivilege 4360 wmic.exe Token: SeBackupPrivilege 4360 wmic.exe Token: SeRestorePrivilege 4360 wmic.exe Token: SeShutdownPrivilege 4360 wmic.exe Token: SeDebugPrivilege 4360 wmic.exe Token: SeSystemEnvironmentPrivilege 4360 wmic.exe Token: SeRemoteShutdownPrivilege 4360 wmic.exe Token: SeUndockPrivilege 4360 wmic.exe Token: SeManageVolumePrivilege 4360 wmic.exe Token: 33 4360 wmic.exe Token: 34 4360 wmic.exe Token: 35 4360 wmic.exe Token: 36 4360 wmic.exe Token: SeIncreaseQuotaPrivilege 2924 wmic.exe Token: SeSecurityPrivilege 2924 wmic.exe Token: SeTakeOwnershipPrivilege 2924 wmic.exe Token: SeLoadDriverPrivilege 2924 wmic.exe Token: SeSystemProfilePrivilege 2924 wmic.exe Token: SeSystemtimePrivilege 2924 wmic.exe Token: SeProfSingleProcessPrivilege 2924 wmic.exe Token: SeIncBasePriorityPrivilege 2924 wmic.exe Token: SeCreatePagefilePrivilege 2924 wmic.exe Token: SeBackupPrivilege 2924 wmic.exe Token: SeRestorePrivilege 2924 wmic.exe Token: SeShutdownPrivilege 2924 wmic.exe Token: SeDebugPrivilege 2924 wmic.exe Token: SeSystemEnvironmentPrivilege 2924 wmic.exe Token: SeRemoteShutdownPrivilege 2924 wmic.exe Token: SeUndockPrivilege 2924 wmic.exe Token: SeManageVolumePrivilege 2924 wmic.exe Token: 33 2924 wmic.exe Token: 34 2924 wmic.exe Token: 35 2924 wmic.exe Token: 36 2924 wmic.exe Token: SeIncreaseQuotaPrivilege 2924 wmic.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4800 wrote to memory of 2936 4800 043eb8f5c9b206850f07b8ec3af4ec30_JaffaCakes118.exe 83 PID 4800 wrote to memory of 2936 4800 043eb8f5c9b206850f07b8ec3af4ec30_JaffaCakes118.exe 83 PID 4800 wrote to memory of 2936 4800 043eb8f5c9b206850f07b8ec3af4ec30_JaffaCakes118.exe 83 PID 2936 wrote to memory of 4360 2936 ebhcabfbbjbgd.exe 84 PID 2936 wrote to memory of 4360 2936 ebhcabfbbjbgd.exe 84 PID 2936 wrote to memory of 4360 2936 ebhcabfbbjbgd.exe 84 PID 2936 wrote to memory of 2924 2936 ebhcabfbbjbgd.exe 88 PID 2936 wrote to memory of 2924 2936 ebhcabfbbjbgd.exe 88 PID 2936 wrote to memory of 2924 2936 ebhcabfbbjbgd.exe 88 PID 2936 wrote to memory of 4724 2936 ebhcabfbbjbgd.exe 90 PID 2936 wrote to memory of 4724 2936 ebhcabfbbjbgd.exe 90 PID 2936 wrote to memory of 4724 2936 ebhcabfbbjbgd.exe 90 PID 2936 wrote to memory of 1624 2936 ebhcabfbbjbgd.exe 93 PID 2936 wrote to memory of 1624 2936 ebhcabfbbjbgd.exe 93 PID 2936 wrote to memory of 1624 2936 ebhcabfbbjbgd.exe 93 PID 2936 wrote to memory of 780 2936 ebhcabfbbjbgd.exe 96 PID 2936 wrote to memory of 780 2936 ebhcabfbbjbgd.exe 96 PID 2936 wrote to memory of 780 2936 ebhcabfbbjbgd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\043eb8f5c9b206850f07b8ec3af4ec30_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\043eb8f5c9b206850f07b8ec3af4ec30_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\ebhcabfbbjbgd.exeC:\Users\Admin\AppData\Local\Temp\ebhcabfbbjbgd.exe 8!0!4!6!3!9!0!7!5!7!7 J1BFPjopMiobKExNQkxDQTQwGSpHPkxXS0xIQEQ2LBkoPElPTkY7PSsvLykpICs9Rjs9KRsoSUpPQE9AS19CPzYqLjkwGixKRUtRPktXVU5GOl90bWszKCdzbnArO0VMRiZNR1ApO01HLkJJP0gYLz9GRjpLQj82KyhUNHFvKXZdMz8raHEuTy5aMVtqcypxSjVQUycwKSkZKDwxOSs0LTYxLBkoPDI5Ky8sOSwsGSg8MzknLhcvPS82JikgKz4yNC0qGyhJSk9AT0BLX0lNQk85Q1U3HSZQS0o9TjtUWz9SQ0E2GyhJSk9AT0BLX0c8Rj41ICs/VTxfTk1FNhgvQVJCVkNGP0VCRkU5Giw/T0xPWDtKT1NNQkk9KxsoTUBBSkVWRlVYUEtFNSArUEo0MhkqPUwpPRwpT0xOTURGPldXQUZARk0+REY6P0VRTEk0IChETFhKVUpORkRFNm9rbl0gK0xCS1VLSUJHP19RTUJJXz08Ukw1MhwpRUBEPlM2KhgvRU1cO1lHPEZCO19BSEBJWUlPPj01Zl1mcFwgKD9IUEZMSztBVklJOC8uJjQ1KC8lMTEuGShMSUk/Oig0KzQrMikyMiwdJkRIUkdFR0FAWVFATT44LSgpNyssLSg1IzAzKyk6LCwnR00ZKk46NU1rdGZjbFogK18tLiwlJU5pZ19ocGsrSk4oLS4qICxbI1dLUTMrKSQ8aWlkZVNfX0JpbSArXy0zMygwLSshRkFNRUwhLGAibGJmXiQ/ZV9lbCArPGNraGVlISxjKzInKycrKjkuKC0iU1phWmthJS5gMio3Jy4vGSdVTkY6X3Rtax4sWSUuYCIpZmBgbWsmMC0sLVsuYmlfaB0yYkxyZVRiaF49Z3dqZmxYZEZcZ1pfZW5ZYVxwZWpyHipmLS4vMDIyLCsvLSUuYC4rMjItMioqNjEfL10xLS0yKzExLjAyHDNfLzAyKTYwLS4wMCpUKi5qTj8yNFlUcGtGYzlpVE5Ob0xjRG1GOjFvSkAndkY/RmBZamtxRU5RcEpMaG1OUDstQ2lPXUZjb3RHc3QrTEwrY1JlTmxTaltpUHVwbERGQS1fZUlxXmUpblJPcnBZaj9IRlBBdFMsVyxLLFFBSD0xU0Z2bnBDTk9jUDJ0bks7SWVfZkNmUD9x2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81714273750.txt bios get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81714273750.txt bios get version3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81714273750.txt bios get version3⤵PID:4724
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81714273750.txt bios get version3⤵PID:1624
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81714273750.txt bios get version3⤵PID:780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 9563⤵
- Program crash
PID:1136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2936 -ip 29361⤵PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD59025468f85256136f923096b01375964
SHA17fcd174999661594fa5f88890ffb195e9858cc52
SHA256d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA51292cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
58B
MD5f8e2f71e123c5a848f2a83d2a7aef11e
SHA15e7a9a2937fa4f06fdf3e33d7def7de431c159b4
SHA25679dae8edfddb5a748fb1ed83c87081b245aeff9178c95dcf5fbaaed6baf82121
SHA5128d34a80d335ee5be5d899b19b385aeaeb6bc5480fd72d3d9e96269da2f544ccc13b30fd23111980de736a612b8beb24ff062f6bed2eb2d252dbe07a2ffeb701e
-
Filesize
764KB
MD5869e5e17ff95ed78a4c2f9d139fc9c55
SHA1dcd1e5792508732cb47b6743b2eb64408224b435
SHA256fcd3a84be9690f593c28f65bd880994831c1b2fd1c641052f8ab0fd0431fbe50
SHA512440d5df306c3259f3ab616fbd79d3c869860839ae2c91aaa17d2461553e02ced5b3df5e42746d5213dd7c43cbc1be35c431f992c70b7144781afdfe913f51182
-
Filesize
40KB
MD55f13dbc378792f23e598079fc1e4422b
SHA15813c05802f15930aa860b8363af2b58426c8adf
SHA2566e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d
SHA5129270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5
-
Filesize
126KB
MD5740244cbfd0d0d60118c75e073a816bf
SHA177237f3c19dad58f0143dba6d1e001a7b9273f88
SHA256919d11eee42c3d57baeadecb4cda2cb790643ea1fd26b568ed72e48e4d90057b
SHA5123c3b69f9edd64a9ab97c8c2f53f97f9fab68d14b46028d3617b3f85bbcc1dd64ff22579302772a638ed102e10324db2a8247a06a099d8683515bb7c3ce91f645