Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/kyhrd.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/kyhrd.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win10v2004-20240419-en
General
-
Target
10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe
-
Size
558KB
-
MD5
10f9a88c7a8c0f30d9e9533f973aba44
-
SHA1
e751c2e099593fc52968b1dffb28a191c5fc90ab
-
SHA256
f9628c9278c1ae0e666ee3ddfda70614d6c22af1c6b70435f7d8b1651051f4f3
-
SHA512
54c017956d148e9c9d291259ce6c68b9fe526d7f9755bbbb81deea27dbbff3efbf4785700f4665776a47b668b6ceceea68c0a5e6f5b5196fa00a979c04dc4bc7
-
SSDEEP
12288:OEaZkIWPAbC8EmNuJVMlnG/YmBWl7dlZGLw1CtwD8UCtAyI:O9GAReJVe0YIW33NCaDXCa1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1664 eccabfbcefh.exe -
Loads dropped DLL 10 IoCs
pid Process 2740 10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe 2740 10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe 2740 10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe 2912 WerFault.exe 2912 WerFault.exe 2912 WerFault.exe 2912 WerFault.exe 2912 WerFault.exe 2912 WerFault.exe 2912 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2912 1664 WerFault.exe 28 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2556 wmic.exe Token: SeSecurityPrivilege 2556 wmic.exe Token: SeTakeOwnershipPrivilege 2556 wmic.exe Token: SeLoadDriverPrivilege 2556 wmic.exe Token: SeSystemProfilePrivilege 2556 wmic.exe Token: SeSystemtimePrivilege 2556 wmic.exe Token: SeProfSingleProcessPrivilege 2556 wmic.exe Token: SeIncBasePriorityPrivilege 2556 wmic.exe Token: SeCreatePagefilePrivilege 2556 wmic.exe Token: SeBackupPrivilege 2556 wmic.exe Token: SeRestorePrivilege 2556 wmic.exe Token: SeShutdownPrivilege 2556 wmic.exe Token: SeDebugPrivilege 2556 wmic.exe Token: SeSystemEnvironmentPrivilege 2556 wmic.exe Token: SeRemoteShutdownPrivilege 2556 wmic.exe Token: SeUndockPrivilege 2556 wmic.exe Token: SeManageVolumePrivilege 2556 wmic.exe Token: 33 2556 wmic.exe Token: 34 2556 wmic.exe Token: 35 2556 wmic.exe Token: SeIncreaseQuotaPrivilege 2556 wmic.exe Token: SeSecurityPrivilege 2556 wmic.exe Token: SeTakeOwnershipPrivilege 2556 wmic.exe Token: SeLoadDriverPrivilege 2556 wmic.exe Token: SeSystemProfilePrivilege 2556 wmic.exe Token: SeSystemtimePrivilege 2556 wmic.exe Token: SeProfSingleProcessPrivilege 2556 wmic.exe Token: SeIncBasePriorityPrivilege 2556 wmic.exe Token: SeCreatePagefilePrivilege 2556 wmic.exe Token: SeBackupPrivilege 2556 wmic.exe Token: SeRestorePrivilege 2556 wmic.exe Token: SeShutdownPrivilege 2556 wmic.exe Token: SeDebugPrivilege 2556 wmic.exe Token: SeSystemEnvironmentPrivilege 2556 wmic.exe Token: SeRemoteShutdownPrivilege 2556 wmic.exe Token: SeUndockPrivilege 2556 wmic.exe Token: SeManageVolumePrivilege 2556 wmic.exe Token: 33 2556 wmic.exe Token: 34 2556 wmic.exe Token: 35 2556 wmic.exe Token: SeIncreaseQuotaPrivilege 2612 wmic.exe Token: SeSecurityPrivilege 2612 wmic.exe Token: SeTakeOwnershipPrivilege 2612 wmic.exe Token: SeLoadDriverPrivilege 2612 wmic.exe Token: SeSystemProfilePrivilege 2612 wmic.exe Token: SeSystemtimePrivilege 2612 wmic.exe Token: SeProfSingleProcessPrivilege 2612 wmic.exe Token: SeIncBasePriorityPrivilege 2612 wmic.exe Token: SeCreatePagefilePrivilege 2612 wmic.exe Token: SeBackupPrivilege 2612 wmic.exe Token: SeRestorePrivilege 2612 wmic.exe Token: SeShutdownPrivilege 2612 wmic.exe Token: SeDebugPrivilege 2612 wmic.exe Token: SeSystemEnvironmentPrivilege 2612 wmic.exe Token: SeRemoteShutdownPrivilege 2612 wmic.exe Token: SeUndockPrivilege 2612 wmic.exe Token: SeManageVolumePrivilege 2612 wmic.exe Token: 33 2612 wmic.exe Token: 34 2612 wmic.exe Token: 35 2612 wmic.exe Token: SeIncreaseQuotaPrivilege 2472 wmic.exe Token: SeSecurityPrivilege 2472 wmic.exe Token: SeTakeOwnershipPrivilege 2472 wmic.exe Token: SeLoadDriverPrivilege 2472 wmic.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2740 wrote to memory of 1664 2740 10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe 28 PID 2740 wrote to memory of 1664 2740 10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe 28 PID 2740 wrote to memory of 1664 2740 10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe 28 PID 2740 wrote to memory of 1664 2740 10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe 28 PID 1664 wrote to memory of 2556 1664 eccabfbcefh.exe 29 PID 1664 wrote to memory of 2556 1664 eccabfbcefh.exe 29 PID 1664 wrote to memory of 2556 1664 eccabfbcefh.exe 29 PID 1664 wrote to memory of 2556 1664 eccabfbcefh.exe 29 PID 1664 wrote to memory of 2612 1664 eccabfbcefh.exe 32 PID 1664 wrote to memory of 2612 1664 eccabfbcefh.exe 32 PID 1664 wrote to memory of 2612 1664 eccabfbcefh.exe 32 PID 1664 wrote to memory of 2612 1664 eccabfbcefh.exe 32 PID 1664 wrote to memory of 2472 1664 eccabfbcefh.exe 34 PID 1664 wrote to memory of 2472 1664 eccabfbcefh.exe 34 PID 1664 wrote to memory of 2472 1664 eccabfbcefh.exe 34 PID 1664 wrote to memory of 2472 1664 eccabfbcefh.exe 34 PID 1664 wrote to memory of 2504 1664 eccabfbcefh.exe 36 PID 1664 wrote to memory of 2504 1664 eccabfbcefh.exe 36 PID 1664 wrote to memory of 2504 1664 eccabfbcefh.exe 36 PID 1664 wrote to memory of 2504 1664 eccabfbcefh.exe 36 PID 1664 wrote to memory of 2508 1664 eccabfbcefh.exe 38 PID 1664 wrote to memory of 2508 1664 eccabfbcefh.exe 38 PID 1664 wrote to memory of 2508 1664 eccabfbcefh.exe 38 PID 1664 wrote to memory of 2508 1664 eccabfbcefh.exe 38 PID 1664 wrote to memory of 2912 1664 eccabfbcefh.exe 40 PID 1664 wrote to memory of 2912 1664 eccabfbcefh.exe 40 PID 1664 wrote to memory of 2912 1664 eccabfbcefh.exe 40 PID 1664 wrote to memory of 2912 1664 eccabfbcefh.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\eccabfbcefh.exeC:\Users\Admin\AppData\Local\Temp\eccabfbcefh.exe 0-1-5-4-0-1-1-8-9-5-0 L09EQD0yLykXKlNVQUtFRDwvGCZJRVRWSk5LSEM1KBsvREhOUElDPCsuLzYgLj5FRDwvGCZLUk9DUD9UXkg8NC41NzcbK1NEUU48TV9VUUc5aHNzaDEqL3NxcSpERFJDJE9PUCw8TFAtSEY9SiAvQkdFQ0pIPDQbL0QwOC03MzEsFypEMjwoLSAuQys0KDEgLj8wPSwwGCY/NT0sLBwvT1FHO1BDVF5LTklVQDtQOCAvT01LRFRCTFZAVUxAOBwvT1FHO1BDVF5JPU1EPEVgXnJvcmpidCQxKEpgY3VxZHB5JDEoPG5zZW1vZWFrchgmQFhFXlBOTDxnbGtrOi8uaG9lLWNkamBydmheYS5saFtpanNvZW8qY25sJ1tqd25ral1kLkAnKio4L0AuNEZFQT4pKDExMS0pNDdBLCQ8RjYvKEE0M0UuOz4yOEE/NC9kbW1qKmFtYzEwL2xyXWBpc3RgZ2guZHddFypFWERaP01DS0FFQD0gLkNLU1NeOklKV1NETTkyHy5MPzxOS1hKUV9UUUQ0Gy9WTDgsIC5DSyg4IC9RUEpUSEw9VlJFTEJKSUVITDk+QFVSSzgcL0hSV0lQTlRISEE9c3FtXBsvUkRPUVJNSEY+WlVTRE1bREBYSzQtIC9HREBFVzwpFypJU14/VU5ATEE6WkVOQk1VUFNEPDRhYWxyYBwvQ05PRUdPQUNaRVA8NTAlLTA0LSsqOR8uTEBIRT0wLy43ODItLi4xIC4/S1dNS0c4P19USEhBPTMuKiYtMDE0JS0yOTMwMTAxKkBI2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81714754930.txt bios get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81714754930.txt bios get version3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81714754930.txt bios get version3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81714754930.txt bios get version3⤵PID:2504
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81714754930.txt bios get version3⤵PID:2508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 3683⤵
- Loads dropped DLL
- Program crash
PID:2912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD59025468f85256136f923096b01375964
SHA17fcd174999661594fa5f88890ffb195e9858cc52
SHA256d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA51292cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51
-
Filesize
765KB
MD5adf74b9806a7ce6d3cf3d2e7220826ab
SHA1508f3608eefbbed7b7c28827d490005cb41981d5
SHA2567b00665b34c362153be1185391988c948502279d9d6c990def06959faf5aea53
SHA512ecc6c4fc7960c00ec389255955cc173a8e4b7334349e140b43bd0e9f824fea159909c4b33e3a83c84b20347abffe1cb84e4e109ca0dbbceb0c2fc1406786ba89
-
Filesize
125KB
MD590de0d49e928a4199475d30b3a7a7a37
SHA1777711d533adbada6413c27afdb83d027177e7ef
SHA25620b4a909ae1f1b7be6f79deb355558bfcc923e9cb0fc59aa44d4f25f75fdacf8
SHA512c5fb7116a55a238b397b88b881905bf31d13d48f3f43c1ef36194b88d5e2b6bcaf5eb205d71f458ce19c60f9b47929b8e3cdd17edc69f09d32e5f5d58d5b5bc4
-
Filesize
40KB
MD55f13dbc378792f23e598079fc1e4422b
SHA15813c05802f15930aa860b8363af2b58426c8adf
SHA2566e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d
SHA5129270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5