Analysis
-
max time kernel
142s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
24ff7b20126836191f694f4d51839bde_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
24ff7b20126836191f694f4d51839bde_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
24ff7b20126836191f694f4d51839bde_JaffaCakes118.exe
-
Size
475KB
-
MD5
24ff7b20126836191f694f4d51839bde
-
SHA1
626ae181ac100c6e8beab026c5a1a75106a8cbdf
-
SHA256
de0904f35a06210ddb20cb2edd8e7021e3a547cc3fc71d2d417107d119a3c8ef
-
SHA512
1120d6f0b5b34db3e2b5d593260daedec2799f7fbe86855afe67a969d482e41294297a89d878d68501bcc1ba5d40eb1d418f91899e2b92bce6252bdc509d390d
-
SSDEEP
12288:oYOUJAyVEO8kV0fJOFBezrlMpF2IqcYPoxmtF9fS:tJAySfJOCtMpRqcwoxmf96
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1900 yhiagvicbojqgn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1900 yhiagvicbojqgn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1900 yhiagvicbojqgn.exe 1900 yhiagvicbojqgn.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3548 wrote to memory of 1900 3548 24ff7b20126836191f694f4d51839bde_JaffaCakes118.exe 85 PID 3548 wrote to memory of 1900 3548 24ff7b20126836191f694f4d51839bde_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\24ff7b20126836191f694f4d51839bde_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\24ff7b20126836191f694f4d51839bde_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\yhiagvicbojqgn.exe"C:\Users\Admin\AppData\Local\Temp\\yhiagvicbojqgn.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1900
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
475KB
MD524ff7b20126836191f694f4d51839bde
SHA1626ae181ac100c6e8beab026c5a1a75106a8cbdf
SHA256de0904f35a06210ddb20cb2edd8e7021e3a547cc3fc71d2d417107d119a3c8ef
SHA5121120d6f0b5b34db3e2b5d593260daedec2799f7fbe86855afe67a969d482e41294297a89d878d68501bcc1ba5d40eb1d418f91899e2b92bce6252bdc509d390d
-
Filesize
23KB
MD5831fe278215fcca35b2591bd81bfc398
SHA1b1b37650a6ff8208968d95c3f89fcf52fdafaf0d
SHA2567a19030ab932a63e1d6facc331ee2add06143fc581e9f6c6585eecab6c94d552
SHA512997314ce7bb525f81545474777344aa0c87dbf8eb5ab3a0b2edb843f936527da063ce64a4c47cba0b2bd56f3e9c80245d659a681977013e85380132109664e9e