Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
6269bc7fb1c334e4f1f4c5fb7836d8d9_JaffaCakes118.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6269bc7fb1c334e4f1f4c5fb7836d8d9_JaffaCakes118.jar
Resource
win10v2004-20240508-en
General
-
Target
6269bc7fb1c334e4f1f4c5fb7836d8d9_JaffaCakes118.jar
-
Size
484KB
-
MD5
6269bc7fb1c334e4f1f4c5fb7836d8d9
-
SHA1
545438b23e66f5e6e7751cbc21a8455fd909b785
-
SHA256
a2aa7720b1b234713b9fc9c4fdef962c318da9719da933de4ae2f63e8a56cd8f
-
SHA512
e59cc4eb2184115d8a40a8b08a7af6002f7e7a7c61b5455e3718da383e08549f617374542d9ccbe2a9a4f3e78d3431689e3053681f5d14060bc90b1832243163
-
SSDEEP
12288:SjOeDcmlOhzEyrXXnjXshSTEqOVP9o/8Fy:gQLXXXwhSgLP9okFy
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4800 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4800 3632 java.exe 83 PID 3632 wrote to memory of 4800 3632 java.exe 83
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\6269bc7fb1c334e4f1f4c5fb7836d8d9_JaffaCakes118.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD50a62065961c48b153fb8f1aaad4d187e
SHA1c98da6565e8ac23b10e1050f6785879e770cd74a
SHA256c156c225b7562012400d7708f3e23811dfa62f44f64dd6c38bd3f474ca92982a
SHA512362582a61043fd7408add8c0073baa96b308227f772439736eefc31af442aefaecff1a511fd15d061666f33e2ace51b42e2af70ec24abb57a9aa17d80bccf5b7