Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
179b140b7e9739f8194341a98f3c0b13_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
179b140b7e9739f8194341a98f3c0b13_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
179b140b7e9739f8194341a98f3c0b13_JaffaCakes118.exe
-
Size
674KB
-
MD5
179b140b7e9739f8194341a98f3c0b13
-
SHA1
3688349661d07270674d5a61e4d0c135397440c1
-
SHA256
13e8ee47125f0275a48007ee22edfa78b092b69360417637dc1c48b4f4ec252b
-
SHA512
a8510ff2789f8ad10d7a1d73163ebf5266ca8b53f1876e6263e8b52ce0ab88a7061082756bfc9cb8625482ca2d46a612758ac2ed72e64a668149c51be283514c
-
SSDEEP
12288:9y/hpWFjtrn337HZo+yEoxDl07mwmp0Eulr6z3H+vd/ZhUbrkyjhVkTrfQHCzd5:9yJgT73LHHLoxDlTwmp03GU7UXkyjhVY
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2648-0-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-6-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-5-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-112-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-113-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-114-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-115-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-116-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-132-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-140-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-151-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-150-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-160-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-149-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-161-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-163-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-164-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-165-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-167-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-166-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-168-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-169-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-170-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-171-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-172-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-173-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-174-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-176-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-177-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-178-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-179-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-180-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-181-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-184-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-185-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-187-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-186-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-188-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-189-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-191-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-192-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-193-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-194-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-195-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-196-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-199-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-200-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-201-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-202-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-203-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-204-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-206-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-207-0x00000000021D0000-0x0000000002317000-memory.dmp upx behavioral2/memory/2648-208-0x00000000021D0000-0x0000000002317000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is240599375.log 179b140b7e9739f8194341a98f3c0b13_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2648 179b140b7e9739f8194341a98f3c0b13_JaffaCakes118.exe 2648 179b140b7e9739f8194341a98f3c0b13_JaffaCakes118.exe 2648 179b140b7e9739f8194341a98f3c0b13_JaffaCakes118.exe 2648 179b140b7e9739f8194341a98f3c0b13_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2648 179b140b7e9739f8194341a98f3c0b13_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2648 179b140b7e9739f8194341a98f3c0b13_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2648 179b140b7e9739f8194341a98f3c0b13_JaffaCakes118.exe 2648 179b140b7e9739f8194341a98f3c0b13_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\179b140b7e9739f8194341a98f3c0b13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\179b140b7e9739f8194341a98f3c0b13_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
6KB
MD571c4b9eee86d2b6dee2759f9d4599891
SHA1c1bde0f64ee93e4cd11525a1e1bb73d3227c5a10
SHA2564a0fb9191d25e0b38e33ea69d52da7121322d2baea2f1071da0c705fbf6c9ad6
SHA512479e81c705fb9db92fe5387f3145cc9b493f3c8077cb6048d6889fa0f2de60836b4bcc17f8ef38ad91de4616d8db329d95b1cbf13f430a12ee9dc26de8267ad9
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
16KB
MD5f719b100453d490772a2eb9eaa3f807e
SHA1cea58676d7ae44a29e576ac5ad8a1f1f327ea7a3
SHA256a3357b1b14c5efe4afd0f218f45a3188f304c98d819952e2027037c1fe273488
SHA51277134a6bb786ff5a8f54a22917b1b11abdafef3a79d31e3e9cba748240762c33506616af980d704b51127a42bbb8f4b792ea75cfa6c98bbb2ab301d729b1d760
-
Filesize
293B
MD575a9464e6e2e2d8efc82e5285ab0d95d
SHA103aa7ccf18666265cef894adc30aede977116405
SHA2567ec62b84d0c741b8e1f4c735ba37fd4dc889690590cf900073793b8d6e44cd0a
SHA512c52d190454e7d6fbafdd18960b5c95cc76da66ce02b7d0caf1eecc3335ae60b8aeb8b014be9adfaf46cafcdb7342029ec265d64576483cfc2b2439a514d9b63c
-
Filesize
294B
MD5aa5fc77754056e5cf059ae73ae3ffb93
SHA1d6dea0e225dc926506c9c1bc8d9084cbaf7cc350
SHA256cb4b816b428001c2756dc75791598a256ff2774c5dc9e87253ae77b5aaed8da0
SHA5121c61531ed01bd48af185450f64f6a908784a4846085044109cf18f385592f783ae6c9b99cffe95b4d6fc1108fc2cebdfeccca30a01c682f5d47b019429b0e8a6
-
Filesize
1KB
MD560147e3f18555ea3b6a8aa7f7d5ec4f7
SHA152b308ab2c723c4a95a1218cf5f6d6d376ae50c9
SHA256b7861c8b3c8aaf75c6b915f9b0fb561949de5625e713970639c9c7f52cc157f9
SHA512e6a3d489bad7122dc81665ca59583401f2c6659aa0f61f969dd64247adce3eeb54719392f13baf09882f3bab6b5f7f28e3f663a1a921997218d4c7f0a29d93f8
-
Filesize
1KB
MD597dce4b9ac73486feacecd8b4a3b9186
SHA1c9aa6bf98fcf33e423cac9585f46fb661a2431e0
SHA25672b1ea3e029a939c6fc0851c422787319c61d3b9a1945b82e193ed255fbcdab2
SHA5122a86cbd94333a4750be7a6a53f0e655f4843cd4584eef5c8f8172ba25e88c0fda4f2e7d903d5cd76ed38a714a00305b5a29a620df1ef515b6949578d3108712f
-
Filesize
1KB
MD594cff096cae7f90af8db4d4113e5dafb
SHA1bf1daf81dd18c0fc72c403514b2880088549c689
SHA256e6d91d3be5902fdb8f296d54631499df31d8ade6299dd78e902d7578b4d15e18
SHA51229360549eb7a722fd357e6f0ca5d06bddd05ff096e0a8301cf8d14c0195a3b3aed9351a8f2665199ecc9538b5c954738efcffdbd33654868fd2ba8a8355cf9a3
-
Filesize
1KB
MD50430f4b4f794e57c8d2b4b3b8866d2ce
SHA137d5844d964a4a486d6d3c8687dae03b224e13c6
SHA25684dd580b596a809dc8153a492b2ee8c5f176fed8d2947eab0dc3b3a172efe0c9
SHA512bcf902320766e08d7cb7b4b8c6b84d6533fa593f0e8ce2a799b49c3cff0d49316fee8593587c4010878b83d550d502f6fabe0f4213bd0862dba46480468a60f5