Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 15:29
Static task
static1
Behavioral task
behavioral1
Sample
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
-
Size
463KB
-
MD5
50333dad192d9888ce17fa31bd466256
-
SHA1
0e13f68a360abd1e3e2f8e3601ed0bf1641196f0
-
SHA256
875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4
-
SHA512
c3e9529180fb4327305de547e154fd720a9574ce3dbb97a09f07613255aa3b37b4f5aa97da3ca4e424d9dcbf320c783816b0c2453e5852cc1397fffef12a13e3
-
SSDEEP
6144:cbiYCMinOZCVn3PzN2bZB8gpqECIm0ROn49SY851EkTH6z26nGgvkfA77juvpMh2:AWMQtJ32qEZRzSYWvzlPfA7Xu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
spoolsv.exespoolsv.exepid process 2700 spoolsv.exe 2732 spoolsv.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exespoolsv.exepid process 2644 cmd.exe 2700 spoolsv.exe -
Processes:
spoolsv.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exespoolsv.exedescription pid process target process PID 2220 set thread context of 2712 2220 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 2700 set thread context of 2732 2700 spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe50333dad192d9888ce17fa31bd466256_JaffaCakes118.exespoolsv.exespoolsv.exepid process 2220 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 2712 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 2712 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 2712 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 2700 spoolsv.exe 2732 spoolsv.exe 2732 spoolsv.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
spoolsv.exepid process 2732 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe50333dad192d9888ce17fa31bd466256_JaffaCakes118.exespoolsv.exespoolsv.exedescription pid process Token: SeDebugPrivilege 2220 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe Token: SeDebugPrivilege 2712 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe Token: SeDebugPrivilege 2700 spoolsv.exe Token: SeDebugPrivilege 2732 spoolsv.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe50333dad192d9888ce17fa31bd466256_JaffaCakes118.execmd.exespoolsv.exedescription pid process target process PID 2220 wrote to memory of 2712 2220 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 2220 wrote to memory of 2712 2220 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 2220 wrote to memory of 2712 2220 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 2220 wrote to memory of 2712 2220 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 2220 wrote to memory of 2712 2220 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 2220 wrote to memory of 2712 2220 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 2220 wrote to memory of 2712 2220 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 2220 wrote to memory of 2712 2220 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 2220 wrote to memory of 2712 2220 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 2712 wrote to memory of 2644 2712 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe cmd.exe PID 2712 wrote to memory of 2644 2712 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe cmd.exe PID 2712 wrote to memory of 2644 2712 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe cmd.exe PID 2712 wrote to memory of 2644 2712 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe cmd.exe PID 2644 wrote to memory of 2564 2644 cmd.exe PING.EXE PID 2644 wrote to memory of 2564 2644 cmd.exe PING.EXE PID 2644 wrote to memory of 2564 2644 cmd.exe PING.EXE PID 2644 wrote to memory of 2564 2644 cmd.exe PING.EXE PID 2644 wrote to memory of 2700 2644 cmd.exe spoolsv.exe PID 2644 wrote to memory of 2700 2644 cmd.exe spoolsv.exe PID 2644 wrote to memory of 2700 2644 cmd.exe spoolsv.exe PID 2644 wrote to memory of 2700 2644 cmd.exe spoolsv.exe PID 2700 wrote to memory of 2732 2700 spoolsv.exe spoolsv.exe PID 2700 wrote to memory of 2732 2700 spoolsv.exe spoolsv.exe PID 2700 wrote to memory of 2732 2700 spoolsv.exe spoolsv.exe PID 2700 wrote to memory of 2732 2700 spoolsv.exe spoolsv.exe PID 2700 wrote to memory of 2732 2700 spoolsv.exe spoolsv.exe PID 2700 wrote to memory of 2732 2700 spoolsv.exe spoolsv.exe PID 2700 wrote to memory of 2732 2700 spoolsv.exe spoolsv.exe PID 2700 wrote to memory of 2732 2700 spoolsv.exe spoolsv.exe PID 2700 wrote to memory of 2732 2700 spoolsv.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 8000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"&start C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 80004⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exeC:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe"C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\svhost.exeFilesize
52KB
MD5278edbd499374bf73621f8c1f969d894
SHA1a81170af14747781c5f5f51bb1215893136f0bc0
SHA256c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA51293b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9
-
C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exeFilesize
463KB
MD550333dad192d9888ce17fa31bd466256
SHA10e13f68a360abd1e3e2f8e3601ed0bf1641196f0
SHA256875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4
SHA512c3e9529180fb4327305de547e154fd720a9574ce3dbb97a09f07613255aa3b37b4f5aa97da3ca4e424d9dcbf320c783816b0c2453e5852cc1397fffef12a13e3
-
memory/2220-1-0x0000000074BC0000-0x000000007516B000-memory.dmpFilesize
5.7MB
-
memory/2220-2-0x0000000074BC0000-0x000000007516B000-memory.dmpFilesize
5.7MB
-
memory/2220-45-0x0000000074BC0000-0x000000007516B000-memory.dmpFilesize
5.7MB
-
memory/2220-0-0x0000000074BC1000-0x0000000074BC2000-memory.dmpFilesize
4KB
-
memory/2712-22-0x0000000000080000-0x00000000000C6000-memory.dmpFilesize
280KB
-
memory/2712-24-0x0000000074BC0000-0x000000007516B000-memory.dmpFilesize
5.7MB
-
memory/2712-14-0x0000000000080000-0x00000000000C6000-memory.dmpFilesize
280KB
-
memory/2712-4-0x0000000000080000-0x00000000000C6000-memory.dmpFilesize
280KB
-
memory/2712-8-0x0000000000080000-0x00000000000C6000-memory.dmpFilesize
280KB
-
memory/2712-6-0x0000000000080000-0x00000000000C6000-memory.dmpFilesize
280KB
-
memory/2712-23-0x0000000074BC0000-0x000000007516B000-memory.dmpFilesize
5.7MB
-
memory/2712-15-0x0000000000080000-0x00000000000C6000-memory.dmpFilesize
280KB
-
memory/2712-26-0x0000000074BC0000-0x000000007516B000-memory.dmpFilesize
5.7MB
-
memory/2712-19-0x0000000000080000-0x00000000000C6000-memory.dmpFilesize
280KB
-
memory/2712-10-0x0000000000080000-0x00000000000C6000-memory.dmpFilesize
280KB
-
memory/2712-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2732-40-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2732-43-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/2732-44-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB