Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
2c6ddb55717e8b5a6c1892f0f94ce86d_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2c6ddb55717e8b5a6c1892f0f94ce86d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
2c6ddb55717e8b5a6c1892f0f94ce86d_JaffaCakes118.exe
-
Size
765KB
-
MD5
2c6ddb55717e8b5a6c1892f0f94ce86d
-
SHA1
202ed4d21f65cb207363500c8ddc4ae8032f4ec3
-
SHA256
7975cd103502794e6bcc48d4edfb763cacea15ec9c56f1375677bb5bbabbd887
-
SHA512
1069bddc78a351db87b60fe1d25aaf7bf236072f30fc5b3da85b818785347edafc99578ab0d5df0e339ff8693e72698b185fa2dd618be8bfb60f9990d925c2d1
-
SSDEEP
12288:MV8uPffOvun3aRm+uDkHUXNrJyjpdFNTyIma7VrUteFS8Z:MV8uP9AuDH+xNTy8gWhZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3000 1C57.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 1200 2c6ddb55717e8b5a6c1892f0f94ce86d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2728 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2484 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2728 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1200 wrote to memory of 3000 1200 2c6ddb55717e8b5a6c1892f0f94ce86d_JaffaCakes118.exe 29 PID 1200 wrote to memory of 3000 1200 2c6ddb55717e8b5a6c1892f0f94ce86d_JaffaCakes118.exe 29 PID 1200 wrote to memory of 3000 1200 2c6ddb55717e8b5a6c1892f0f94ce86d_JaffaCakes118.exe 29 PID 1200 wrote to memory of 3000 1200 2c6ddb55717e8b5a6c1892f0f94ce86d_JaffaCakes118.exe 29 PID 3000 wrote to memory of 2580 3000 1C57.tmp.exe 30 PID 3000 wrote to memory of 2580 3000 1C57.tmp.exe 30 PID 3000 wrote to memory of 2580 3000 1C57.tmp.exe 30 PID 3000 wrote to memory of 2580 3000 1C57.tmp.exe 30 PID 2580 wrote to memory of 2728 2580 cmd.exe 32 PID 2580 wrote to memory of 2728 2580 cmd.exe 32 PID 2580 wrote to memory of 2728 2580 cmd.exe 32 PID 2580 wrote to memory of 2728 2580 cmd.exe 32 PID 2580 wrote to memory of 2484 2580 cmd.exe 33 PID 2580 wrote to memory of 2484 2580 cmd.exe 33 PID 2580 wrote to memory of 2484 2580 cmd.exe 33 PID 2580 wrote to memory of 2484 2580 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c6ddb55717e8b5a6c1892f0f94ce86d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c6ddb55717e8b5a6c1892f0f94ce86d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\1C57.tmp.exe"C:\Users\Admin\AppData\Local\Temp\1C57.tmp.exe" --stid="" --onl2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /pid 3000 & for /l %x in (1,1,60) do ( ping 127.0.0.1 -n 2 -w 500 & del /q /f "C:\Users\Admin\AppData\Local\Temp\1C57.tmp.exe" & if not exist "C:\Users\Admin\AppData\Local\Temp\1C57.tmp.exe" ( exit ) )3⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 30004⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 2 -w 5004⤵
- Runs ping.exe
PID:2484
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
765KB
MD52c6ddb55717e8b5a6c1892f0f94ce86d
SHA1202ed4d21f65cb207363500c8ddc4ae8032f4ec3
SHA2567975cd103502794e6bcc48d4edfb763cacea15ec9c56f1375677bb5bbabbd887
SHA5121069bddc78a351db87b60fe1d25aaf7bf236072f30fc5b3da85b818785347edafc99578ab0d5df0e339ff8693e72698b185fa2dd618be8bfb60f9990d925c2d1