Analysis
-
max time kernel
136s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 00:21
Static task
static1
Behavioral task
behavioral1
Sample
0f3bfe4158fd34f60c0b23c50e6fb9ea_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
0f3bfe4158fd34f60c0b23c50e6fb9ea_JaffaCakes118.exe
-
Size
364KB
-
MD5
0f3bfe4158fd34f60c0b23c50e6fb9ea
-
SHA1
df9502fe331705e01e39a1eeaec2ed4310639987
-
SHA256
c720e51fc25cb71d74d769450640f2514ac022d7bba8c0f13cba42689ee21a01
-
SHA512
9d205b309cb3618fb8a7d446c2c9b33e44dc131be61e76d190bd5640cb3b23fd72a14649f57533d1e15de1ceef0315c6a799b7cf412a2addf5bb8ad056cd9524
-
SSDEEP
6144:WBOO856a60r+UogID97/IXjBE7SL+MEXxtSbsP6ANs:WBOO3VKID90TBEhx4O6as
Malware Config
Signatures
-
Dave packer 2 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral1/memory/2976-3-0x0000000000370000-0x00000000003A2000-memory.dmp dave behavioral1/memory/2976-8-0x0000000000260000-0x0000000000290000-memory.dmp dave -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
0f3bfe4158fd34f60c0b23c50e6fb9ea_JaffaCakes118.exepid process 2976 0f3bfe4158fd34f60c0b23c50e6fb9ea_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 2332 wermgr.exe Token: SeDebugPrivilege 2332 wermgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0f3bfe4158fd34f60c0b23c50e6fb9ea_JaffaCakes118.exedescription pid process target process PID 2976 wrote to memory of 2332 2976 0f3bfe4158fd34f60c0b23c50e6fb9ea_JaffaCakes118.exe wermgr.exe PID 2976 wrote to memory of 2332 2976 0f3bfe4158fd34f60c0b23c50e6fb9ea_JaffaCakes118.exe wermgr.exe PID 2976 wrote to memory of 2332 2976 0f3bfe4158fd34f60c0b23c50e6fb9ea_JaffaCakes118.exe wermgr.exe PID 2976 wrote to memory of 2332 2976 0f3bfe4158fd34f60c0b23c50e6fb9ea_JaffaCakes118.exe wermgr.exe PID 2976 wrote to memory of 2332 2976 0f3bfe4158fd34f60c0b23c50e6fb9ea_JaffaCakes118.exe wermgr.exe PID 2976 wrote to memory of 2332 2976 0f3bfe4158fd34f60c0b23c50e6fb9ea_JaffaCakes118.exe wermgr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f3bfe4158fd34f60c0b23c50e6fb9ea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f3bfe4158fd34f60c0b23c50e6fb9ea_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2332-135-0x0000000000060000-0x0000000000084000-memory.dmpFilesize
144KB
-
memory/2332-137-0x0000000000060000-0x0000000000084000-memory.dmpFilesize
144KB
-
memory/2976-3-0x0000000000370000-0x00000000003A2000-memory.dmpFilesize
200KB
-
memory/2976-8-0x0000000000260000-0x0000000000290000-memory.dmpFilesize
192KB
-
memory/2976-7-0x0000000000460000-0x000000000048F000-memory.dmpFilesize
188KB
-
memory/2976-10-0x0000000000460000-0x000000000048F000-memory.dmpFilesize
188KB
-
memory/2976-9-0x00000000003B0000-0x00000000003DE000-memory.dmpFilesize
184KB
-
memory/2976-90-0x0000000000460000-0x000000000048F000-memory.dmpFilesize
188KB
-
memory/2976-133-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/2976-134-0x0000000010000000-0x0000000010003000-memory.dmpFilesize
12KB
-
memory/2976-136-0x0000000010000000-0x0000000010003000-memory.dmpFilesize
12KB
-
memory/2976-138-0x0000000000460000-0x000000000048F000-memory.dmpFilesize
188KB