Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe
-
Size
544KB
-
MD5
3e242d2738ce8a6df87d93b5a303e003
-
SHA1
6e711bef1eb48c47db98c5fa7aa3da42132eeadf
-
SHA256
9db25ab2d6f1e37d2cbbae35e5e2e838939d523b512d54639a3bb13b1120b5ae
-
SHA512
1f22f1eec81e9e6702cd2eee6a08f4222517cd42fe315ede8ef182201b85902aa47e68e067e7e21ce5a3223544f29e5fd0e6a2017531db68899748587840435f
-
SSDEEP
12288:zyAEb3J44XuJjKD0baZkm+3VsDK1NnBeWxxXY9k:z4XuJ3bad+3VsDAk0xXCk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2704 Gupdate.exe -
Loads dropped DLL 1 IoCs
pid Process 2656 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Users\\Admin\\AppData\\Local\\Gupdate.exe -boot" Gupdate.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2704 set thread context of 1948 2704 Gupdate.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1948 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2112 3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe Token: 33 2112 3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2112 3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe Token: SeDebugPrivilege 2704 Gupdate.exe Token: 33 2704 Gupdate.exe Token: SeIncBasePriorityPrivilege 2704 Gupdate.exe Token: SeDebugPrivilege 1948 RegAsm.exe Token: 33 1948 RegAsm.exe Token: SeIncBasePriorityPrivilege 1948 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1948 RegAsm.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2552 2112 3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe 28 PID 2112 wrote to memory of 2552 2112 3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe 28 PID 2112 wrote to memory of 2552 2112 3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe 28 PID 2112 wrote to memory of 2552 2112 3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe 28 PID 2112 wrote to memory of 2656 2112 3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2656 2112 3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2656 2112 3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2656 2112 3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2704 2656 cmd.exe 32 PID 2656 wrote to memory of 2704 2656 cmd.exe 32 PID 2656 wrote to memory of 2704 2656 cmd.exe 32 PID 2656 wrote to memory of 2704 2656 cmd.exe 32 PID 2656 wrote to memory of 2704 2656 cmd.exe 32 PID 2656 wrote to memory of 2704 2656 cmd.exe 32 PID 2656 wrote to memory of 2704 2656 cmd.exe 32 PID 2704 wrote to memory of 1948 2704 Gupdate.exe 35 PID 2704 wrote to memory of 1948 2704 Gupdate.exe 35 PID 2704 wrote to memory of 1948 2704 Gupdate.exe 35 PID 2704 wrote to memory of 1948 2704 Gupdate.exe 35 PID 2704 wrote to memory of 1948 2704 Gupdate.exe 35 PID 2704 wrote to memory of 1948 2704 Gupdate.exe 35 PID 2704 wrote to memory of 1948 2704 Gupdate.exe 35 PID 2704 wrote to memory of 1948 2704 Gupdate.exe 35 PID 2704 wrote to memory of 1948 2704 Gupdate.exe 35 PID 2704 wrote to memory of 1948 2704 Gupdate.exe 35 PID 2704 wrote to memory of 1948 2704 Gupdate.exe 35 PID 2704 wrote to memory of 1948 2704 Gupdate.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\3e242d2738ce8a6df87d93b5a303e003_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\Gupdate.exe"2⤵PID:2552
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\Gupdate.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Gupdate.exe"C:\Users\Admin\AppData\Local\Gupdate.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1948
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD53e242d2738ce8a6df87d93b5a303e003
SHA16e711bef1eb48c47db98c5fa7aa3da42132eeadf
SHA2569db25ab2d6f1e37d2cbbae35e5e2e838939d523b512d54639a3bb13b1120b5ae
SHA5121f22f1eec81e9e6702cd2eee6a08f4222517cd42fe315ede8ef182201b85902aa47e68e067e7e21ce5a3223544f29e5fd0e6a2017531db68899748587840435f