Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe
-
Size
732KB
-
MD5
2f3ebd8042ab4c85721574a8daa1ab93
-
SHA1
b759e9226886bc6f9743ae81991468b011d6b88b
-
SHA256
1e2bffa2672a47cdbfd0dfd9f4a531ef5e1c654ee3c262fd21b4fb22630c032e
-
SHA512
245383d093551c31bab9c7517879aeaaac48080f7a16398aba0e9fcae3b7cc9a0a0f3aa496b84c8fbdc9aa613ec280a348ab1f2fee1db58c47cbc942810a4f2a
-
SSDEEP
12288:mFTct0d32sPh2Z1QNK8QfvRyGYfgcYHYGBHiAREscEs6/6ALwXh47WKmI:mFTdR2spSQOXrJFFPREws6NLeK7sI
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2452 ace.exe 2460 ace.exe 2216 ace.exe -
Loads dropped DLL 5 IoCs
pid Process 2540 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 2540 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 2540 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 2540 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 2540 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2540-119-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2540-278-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2460-286-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\turnon = "C:\\Users\\Admin\\AppData\\Roaming\\ace.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2932 set thread context of 2540 2932 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 28 PID 2452 set thread context of 2460 2452 ace.exe 33 PID 2452 set thread context of 2216 2452 ace.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2216 ace.exe Token: SeSecurityPrivilege 2216 ace.exe Token: SeTakeOwnershipPrivilege 2216 ace.exe Token: SeLoadDriverPrivilege 2216 ace.exe Token: SeSystemProfilePrivilege 2216 ace.exe Token: SeSystemtimePrivilege 2216 ace.exe Token: SeProfSingleProcessPrivilege 2216 ace.exe Token: SeIncBasePriorityPrivilege 2216 ace.exe Token: SeCreatePagefilePrivilege 2216 ace.exe Token: SeBackupPrivilege 2216 ace.exe Token: SeRestorePrivilege 2216 ace.exe Token: SeShutdownPrivilege 2216 ace.exe Token: SeDebugPrivilege 2216 ace.exe Token: SeSystemEnvironmentPrivilege 2216 ace.exe Token: SeChangeNotifyPrivilege 2216 ace.exe Token: SeRemoteShutdownPrivilege 2216 ace.exe Token: SeUndockPrivilege 2216 ace.exe Token: SeManageVolumePrivilege 2216 ace.exe Token: SeImpersonatePrivilege 2216 ace.exe Token: SeCreateGlobalPrivilege 2216 ace.exe Token: 33 2216 ace.exe Token: 34 2216 ace.exe Token: 35 2216 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe Token: SeDebugPrivilege 2460 ace.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2932 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 2540 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 2452 ace.exe 2460 ace.exe 2216 ace.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2540 2932 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 28 PID 2932 wrote to memory of 2540 2932 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 28 PID 2932 wrote to memory of 2540 2932 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 28 PID 2932 wrote to memory of 2540 2932 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 28 PID 2932 wrote to memory of 2540 2932 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 28 PID 2932 wrote to memory of 2540 2932 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 28 PID 2932 wrote to memory of 2540 2932 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 28 PID 2932 wrote to memory of 2540 2932 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 28 PID 2540 wrote to memory of 1988 2540 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 29 PID 2540 wrote to memory of 1988 2540 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 29 PID 2540 wrote to memory of 1988 2540 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 29 PID 2540 wrote to memory of 1988 2540 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 29 PID 1988 wrote to memory of 1608 1988 cmd.exe 31 PID 1988 wrote to memory of 1608 1988 cmd.exe 31 PID 1988 wrote to memory of 1608 1988 cmd.exe 31 PID 1988 wrote to memory of 1608 1988 cmd.exe 31 PID 2540 wrote to memory of 2452 2540 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 32 PID 2540 wrote to memory of 2452 2540 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 32 PID 2540 wrote to memory of 2452 2540 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 32 PID 2540 wrote to memory of 2452 2540 2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe 32 PID 2452 wrote to memory of 2460 2452 ace.exe 33 PID 2452 wrote to memory of 2460 2452 ace.exe 33 PID 2452 wrote to memory of 2460 2452 ace.exe 33 PID 2452 wrote to memory of 2460 2452 ace.exe 33 PID 2452 wrote to memory of 2460 2452 ace.exe 33 PID 2452 wrote to memory of 2460 2452 ace.exe 33 PID 2452 wrote to memory of 2460 2452 ace.exe 33 PID 2452 wrote to memory of 2460 2452 ace.exe 33 PID 2452 wrote to memory of 2216 2452 ace.exe 34 PID 2452 wrote to memory of 2216 2452 ace.exe 34 PID 2452 wrote to memory of 2216 2452 ace.exe 34 PID 2452 wrote to memory of 2216 2452 ace.exe 34 PID 2452 wrote to memory of 2216 2452 ace.exe 34 PID 2452 wrote to memory of 2216 2452 ace.exe 34 PID 2452 wrote to memory of 2216 2452 ace.exe 34 PID 2452 wrote to memory of 2216 2452 ace.exe 34 PID 2452 wrote to memory of 2216 2452 ace.exe 34 PID 2452 wrote to memory of 2216 2452 ace.exe 34 PID 2452 wrote to memory of 2216 2452 ace.exe 34 PID 2452 wrote to memory of 2216 2452 ace.exe 34 PID 2452 wrote to memory of 2216 2452 ace.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f3ebd8042ab4c85721574a8daa1ab93_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\XBYMY.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "turnon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\ace.exe" /f4⤵
- Adds Run key to start application
PID:1608
-
-
-
C:\Users\Admin\AppData\Roaming\ace.exe"C:\Users\Admin\AppData\Roaming\ace.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Roaming\ace.exe"C:\Users\Admin\AppData\Roaming\ace.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2460
-
-
C:\Users\Admin\AppData\Roaming\ace.exe"C:\Users\Admin\AppData\Roaming\ace.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2216
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131B
MD51e107377fe0ead2ac39679deb110fe24
SHA14f98e9887eddb7c2b4972becf09336682a91abc2
SHA2562608f3470b1ad2327fe89ed58b47ef98f85135ab25a51ac81356d34682ccc1be
SHA512aa61224f8efa1f8ff864f24cfb2f3dc7c5292b0918ae70d00686ef7a9d74f9bb2d20ab76ff9dcb0faa9a1af201371ef0838cd391dc5689f29d798260678ca19c
-
Filesize
732KB
MD594f843700ca0215f09eeb267750f13e8
SHA15dfd68dd64edb7d57a82cf5dd196d3c685cd0a89
SHA2566b854cbb64eea0470b23a4bf259d938442ccd591c6c299266b39eed308a49df2
SHA5122ffefd0f49046115b636bb036f93c6ab6c10851cfe071c741bb0d1f992818506235fb508726e0db19d72e3161bbd680cb88a7dd8ab75c3183e0a906ce22ae7bd