Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
4c1675fde330a13d604c8543fe8e340e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4c1675fde330a13d604c8543fe8e340e_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
4c1675fde330a13d604c8543fe8e340e_JaffaCakes118.exe
-
Size
709KB
-
MD5
4c1675fde330a13d604c8543fe8e340e
-
SHA1
cc9c41eb736357f40e77e92c59722653242c4fff
-
SHA256
a94fbf0eefcf2267e7751bcf2fc46cfbdc6b42eb26f1c2fd1aa2fc38bd727884
-
SHA512
a0696e0754c0afc8047d4ae38aa0bd17510870caf8e748ed0c2a29f3a60a5eb8a6b1e4c159906c9a3c3c2307d171449a29c57a22d9eb8d9c3e44aef867537d61
-
SSDEEP
12288:tDKvp4EfCWAjcJMC/eAqwOf0B4WgwziVKOxOubuDYec/ns11+VXYJglR:tWvzfP/eAdS0awzAkuNts3EYJG
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1656-171-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-169-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-168-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-167-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-158-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-147-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-130-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-107-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-106-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-105-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-104-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-103-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-6-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-5-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-0-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-174-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-175-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-176-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-177-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-178-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-179-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-180-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-181-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-182-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-186-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-183-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-187-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-188-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx behavioral1/memory/1656-189-0x0000000001E40000-0x0000000001F8E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main 4c1675fde330a13d604c8543fe8e340e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1656 4c1675fde330a13d604c8543fe8e340e_JaffaCakes118.exe 1656 4c1675fde330a13d604c8543fe8e340e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1656 4c1675fde330a13d604c8543fe8e340e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1656 4c1675fde330a13d604c8543fe8e340e_JaffaCakes118.exe 1656 4c1675fde330a13d604c8543fe8e340e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c1675fde330a13d604c8543fe8e340e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c1675fde330a13d604c8543fe8e340e_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
8KB
MD562006bf5a34b37b218c4ea14bc1bdce1
SHA1ca1c6d534b9a9b350ea0ae22553beb87517fd3db
SHA25669b83d2e8d943649c028ffc370f85bf0b3083f79196391d28395b663c7be6443
SHA512743b8e9cab8e3dcceb1d27507f1f1cb57a79a867d3a80d090a7f65393a34cbedbded5bde7f6b2f998ed50e7f3b6792392aac7021f377da3d5df52648c76a0a6d
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
15KB
MD56e085401c326730390a14f0eb72d00be
SHA134cbfc25bc54ca71141f140304e6ee3a83a2b6df
SHA2565dc267aed7194615d4554dfc0b58c98054f8b3bf726d44f44cd27db6dde2fa72
SHA5129e9774151f34679fc5ae30068f8049be2c4472c602fd3bdb97ae4e00d644deb60313b756f6b5aa5af37abadccf45180edb866c1369f1960675588d632611c057
-
Filesize
1KB
MD54d9e933d65430337e6f65b40a0769313
SHA17386eceb41e54e714f5c28f8b65840acf49f4bd8
SHA256fb1a4307a533b33fab2aa739cb31913d3398fe60d4b0cb25247cc5fd11feaa76
SHA5122c4977e16404e459048ffb7848882e1f754f5505dcbf226bf2007e404e8a3e8aa27168be44cbc8c705d85488849ea31ab3ec615562b1ce1a351553219a228a01
-
Filesize
1KB
MD5db2626f82130a76ce73af77f987532ac
SHA1e3fc5812199105d33619d3af587c315cbc45dae7
SHA256393389a223a19a3d5a3b2fa84f2ee0aa27dc945802641a2764bb8ad1f1ee2b98
SHA512bb5490b2b0460cfafa721a9f00b95115ea9fd3ae133637fe7567e932abccf5d625717817931e353760e4a89edc633a38e0c663a9e213f231b1b809af27146fae
-
Filesize
2KB
MD510bd02c03eea4d81d964e48ab7ca57c0
SHA1adac6b648f7fe8db31936d87e5749e2825668926
SHA256b4b5f7345d25fa3179e0e02858999f30aad5e43e8641c81a900497d3d7a1aedf
SHA5123ef2c5e16b85c9240cf258cd0be812a73386e90ac94d95a21b73e6140e11b88c8c9c370f5270afae719b10ef65c64751f0fb2935150e825cd8600b36cd7f601b
-
Filesize
2KB
MD59f711b1f8375d8d1f2cb1587ac0eeec6
SHA17b8c097880890ac5f7c08fcba0c5b4415c70f4bd
SHA256bb19dc0524f32f70d4a7164e602c7a0f9b0e82966ed87838d5ec664502d8fb26
SHA51274c85e6dbaaa12bf6b63975809f70f66fa875cd7f91f1c00e1f452dcdc8c13d25a3f522415cbd569d5b8445348d1e5d9ba36a0def8eda0de38c27ec2763f579a
-
Filesize
2KB
MD59ff6c8092a3d13d8d04f7c9c68ddd1dd
SHA18689e9ecf2d80e43916c0b6d5df6dbe61c480701
SHA2566210c04f880b33e17686e38ccd570e97333fa26236ef507d963dcffd409ae313
SHA5121d352651e93b671e69bc10c382813c42b4631185470385e095b8923c93dd34434b134df44685627098f98eeb357d5ce7f6cff79ba8e7e1a6d4863b8848956a53
-
Filesize
10KB
MD557ca1a2085d82f0574e3ef740b9a5ead
SHA12974f4bf37231205a256f2648189a461e74869c0
SHA256476a7b1085cc64de1c0eb74a6776fa8385d57eb18774f199df83fc4d7bbcc24e
SHA5122d50b9095d06ffd15eeeccf0eb438026ca8d09ba57141fed87a60edd2384e2139320fb5539144a2f16de885c49b0919a93690974f32b73654debca01d9d7d55c
-
Filesize
577B
MD584b37cb510f50c8fea812eb308d3f03f
SHA1d141a79feb407506709f051e55c55438a12fd3b4
SHA2567bf800336671204de36b7d1f6ceffdff830040f51d21bc44f220f68d72cf492b
SHA5123222cb5772a4e9b20de253914c0856c7e6383567df68fcf287801f6f79248f65957515e7ec4a44db1fbe910afeae8ca3349295c4bdf03df6aabde36f2aaa6b5e
-
Filesize
104B
MD535a600a752d3074501de31a516860499
SHA151eac62cf77a0b88a3e9cb9ee6f85def21fd4bcf
SHA25614e064857751b23da7bbe40861ef4caf99b2496227507b8e3108fbac6d901f75
SHA512046ec179571d239bfb2d51be9837f96d9afebf2e5db77bba0f4a25ce8716d37581a3f9753bd2dbb04c47711699a9d93987bceb71df0b8becf8c577d660320069
-
Filesize
1KB
MD599831aa45687058e1092c0267938f057
SHA18640fea8c577fed87628c1a164f3d74b3661c948
SHA256a5255dd027119fb3096eef8a7f9ce900414203327ff0e38ed670a41d1c5e78d0
SHA5129262855232cab942ca94c540bdc3bc30eefd94c4c01defe4192786f04bdc2a8a2a2bbb7149f09a63c8c3a67145940ecff3122e7226a64f1f763c9a94f3e2c5cc
-
Filesize
718B
MD59d31583bcfad58a6b9ddeaf44549a5e6
SHA198f4c693af708e02201de2aee31fe094dc3b0a9c
SHA256e466a2db2f755d9eb68619439af37ff4e45559b7a3f476e226ab2a11aeadae1a
SHA5129ddaaad53375f4d2874fe5c98b6782202d2bd975cdd9363796986dc7567368b94d9ec1aa3e839194097838b787bbd71d574540cf5b04fd04f10fa80d6a89e695
-
Filesize
19KB
MD570e70599d4b853df0f12f6cb0e04695f
SHA16e3a721aef65625bf99b639800476150d262dd4b
SHA25687af4027e8f89459463bdd73df7b928b883eefb20514159d3a1a4be0d39e00c0
SHA5121efcf8af09cf857b3850cec43a88fc8c0992e3b04f78ad2c71b84c2ac7775e745df211582694588b29217aefb1ae02b29b94c2cfe52b5d32bdafb9dce73b9920
-
Filesize
27KB
MD51cc2677e3e29e45e538985839cff2b42
SHA12dab653eb20be72b034a38dc1fcebbd18f079c86
SHA2569216d98a6574dfadacdc8321dc435454cb72c589b3ee8326a9b946966f756d7f
SHA51225575fea9abb1491b5a5853244a9b655ce05f64d98f4b79134674f2d9a560a5af405c1783c9da4a07cfb38b51d060c7a70890c70df6c1c8f4b01e041aa4f649f
-
Filesize
2KB
MD5e3758d529f93fee4807f5ea95fbc1a6c
SHA13a9a1ba234e613e5f808c3ffeda05a10a5dafe00
SHA2568d46eb0c60043dcb7d79ab3d0525148fc901764620c02e4b9c5dd8b0e9026303
SHA512e891552bee3aa10247cad1fcc510331077016a6e71d46827be2dd46017f943c5acc2c1506b41217880d35d52a94989923ad0a345f8791da4bb379eceefe3c407
-
Filesize
4KB
MD583c38f4e0abd0b40ea8aa017e45bfe1c
SHA1834ac428f542ce1ce9c2f61104e2c57290f1af43
SHA256400bbfbe8438ce6602d9f874919c0db169e11de0209c60b8f3244b170e0e5929
SHA5121298eda8c51fd651e588168738d1e4e29a2cfb4dc701f1be47fc9b96da8cda23440cf4785afeec48724f9bcd4b6d98c6cf99edcfa141457f46a52b43843d3c16