Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 07:05
Static task
static1
Behavioral task
behavioral1
Sample
04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe
-
Size
136KB
-
MD5
04a2e6117dcfda604934b6d32df2e2dc
-
SHA1
ad3020a0c1b2fcb32d1bc77a9108e078fc02039a
-
SHA256
166c4c03bc5177904bd0739d07b1c71163f235d7bbb444da8a0fb136d1744eb0
-
SHA512
a2d633e5c5aa247387db295777497e5ed9cee5ae824ec6b9ed82251ad4daaf77d1694964eb80f7ca3601d45c914a7f9ef45410f0c9c1bbf8f2a75183a94479d0
-
SSDEEP
3072:w6pQc+sSxnTrGadgsFqZeo4pwkhUmZr3hPsOraSo:w6p2sSxTrGvsFUejWyZr3hPswaH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1180 04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1180 wrote to memory of 3032 1180 04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe 28 PID 1180 wrote to memory of 3032 1180 04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe 28 PID 1180 wrote to memory of 3032 1180 04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe 28 PID 1180 wrote to memory of 3032 1180 04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe 28 PID 3032 wrote to memory of 2432 3032 cmd.exe 30 PID 3032 wrote to memory of 2432 3032 cmd.exe 30 PID 3032 wrote to memory of 2432 3032 cmd.exe 30 PID 3032 wrote to memory of 2432 3032 cmd.exe 30 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2432 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\xmf9B8F.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe"3⤵
- Views/modifies file attributes
PID:2432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59B
MD58ac0cff2c79e0be48824c610b1e2cdc6
SHA1e7656a3c4022c5c7d00b8101af91c5a9bfbb385f
SHA256eaf7f16d362ccc475d84c18f8fa7adca7f4a8b8581edf3fc462c51afcafe2f1d
SHA512921837b524a1f922d8f2fa4baa83f961a58d56a538f1db8195dd10543de9ba3ebbc8531ee56b92b0ebd3c488c4657455f9ff7524c53ad2a04939fbd078775cfe