Analysis
-
max time kernel
140s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe
-
Size
448KB
-
MD5
3a1f9cc03ce9cf1e7606cc1c7b28bee2
-
SHA1
cda00a090fff93ebdaf68fe6edcabc73c0b263aa
-
SHA256
20f11c3ca5a849e1fe429be57d11ed6f3c07a1c1429b676435603bbf4f6be759
-
SHA512
1dc2de0271d1b2665f385d3590734c345ce1aee75ccfbf6831421c4d0528b56f569700b8723b0dc2f81dfe67432b60f17d8b113c59c8f5aad7f1bf627866e130
-
SSDEEP
6144:UOeTIfnjAEkxJPNeaL9uRqQb3fgnFwFGLgJ2k0SyCKF1pYax6uYj+LJYek:LAEOJPNeapQrgjLgJoSyCuDYax6hjsk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2908 mmgzatlzfbptgh.exe -
Loads dropped DLL 5 IoCs
pid Process 2772 3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe 2772 3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe 2772 3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe 2772 3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe 2772 3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main mmgzatlzfbptgh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2908 mmgzatlzfbptgh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2908 mmgzatlzfbptgh.exe 2908 mmgzatlzfbptgh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2908 2772 3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe 28 PID 2772 wrote to memory of 2908 2772 3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe 28 PID 2772 wrote to memory of 2908 2772 3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe 28 PID 2772 wrote to memory of 2908 2772 3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\mmgzatlzfbptgh.exe"C:\Users\Admin\AppData\Local\Temp\mmgzatlzfbptgh.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD53a1f9cc03ce9cf1e7606cc1c7b28bee2
SHA1cda00a090fff93ebdaf68fe6edcabc73c0b263aa
SHA25620f11c3ca5a849e1fe429be57d11ed6f3c07a1c1429b676435603bbf4f6be759
SHA5121dc2de0271d1b2665f385d3590734c345ce1aee75ccfbf6831421c4d0528b56f569700b8723b0dc2f81dfe67432b60f17d8b113c59c8f5aad7f1bf627866e130
-
Filesize
6KB
MD5371c1df899f9b148a09e3c6f58c37793
SHA18b1474046cc97229823e05689d8c018a1c03b5fd
SHA2565a3fc1727ee82d48de48f43762c3879781b64cf44eab01342bbfe5de68478877
SHA51273f4b4950d23370ec1db614d056c085303de39125fb95c384554e0e7a141ffb0786de746f272263f1472d093c44000323e2f5ca5bd0195b4468a2e436fcce8b9