Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe
-
Size
469KB
-
MD5
68089ff28524b4b4a5e15158d50d6f4c
-
SHA1
3f294a9bf981d6c5d566cb0d6c86014decb5206f
-
SHA256
b260da3f89c57b47e5c68a4d3afc9b6c394260bc03b7a000ba6df5f6f7fab1dd
-
SHA512
681456f53907becd0e3efacf6fe571b2601c8ab76f65a04c35fd93059d89cd4b3179e6a5777bad22b595337a67acfe9305261fb2eebe9a21260c38ac9c347e88
-
SSDEEP
12288:zcYx81TA3aasbCL9ovZI6md1AxLHBWvSlguG1wVA:4XhHas+yGt1CLBW6swV
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exedescription pid process target process PID 2340 set thread context of 2872 2340 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 2340 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exepid process 2872 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exedescription pid process target process PID 2340 wrote to memory of 2872 2340 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe PID 2340 wrote to memory of 2872 2340 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe PID 2340 wrote to memory of 2872 2340 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe PID 2340 wrote to memory of 2872 2340 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe PID 2340 wrote to memory of 2872 2340 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe PID 2340 wrote to memory of 2872 2340 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe PID 2340 wrote to memory of 2872 2340 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe PID 2340 wrote to memory of 2872 2340 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe PID 2340 wrote to memory of 2872 2340 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe PID 2340 wrote to memory of 2872 2340 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe PID 2340 wrote to memory of 2872 2340 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe 68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68089ff28524b4b4a5e15158d50d6f4c_JaffaCakes118.exe"2⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\remcos\logs.datFilesize
79B
MD59e3f4e2cacfa389ac63b70dfd39f945a
SHA1aa12f7bc168c0e2dd252c1bc08620148610a5aaa
SHA25601db70636345774970b4d55aab27727b5acd2984f9909ccde3324e3e109c0dd5
SHA5128cf03326b8d2f8e6e6c6c7ba33a4e4ea0282a1d447d6b4cc8af0fbf48f242747db060a57c810a9b8985e25d8b2492cad9e3c0c07c9e7fd6181a6ef3ebb454e5d
-
memory/2340-6-0x00000000743D0000-0x0000000074ABE000-memory.dmpFilesize
6.9MB
-
memory/2340-15-0x00000000743D0000-0x0000000074ABE000-memory.dmpFilesize
6.9MB
-
memory/2340-3-0x00000000743D0000-0x0000000074ABE000-memory.dmpFilesize
6.9MB
-
memory/2340-4-0x00000000743DE000-0x00000000743DF000-memory.dmpFilesize
4KB
-
memory/2340-5-0x00000000743D0000-0x0000000074ABE000-memory.dmpFilesize
6.9MB
-
memory/2340-0-0x00000000743DE000-0x00000000743DF000-memory.dmpFilesize
4KB
-
memory/2340-1-0x0000000000C90000-0x0000000000D0C000-memory.dmpFilesize
496KB
-
memory/2340-2-0x0000000000340000-0x000000000035E000-memory.dmpFilesize
120KB
-
memory/2872-9-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2872-10-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2872-14-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2872-13-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2872-19-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2872-7-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB