Analysis
-
max time kernel
136s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
693ad4f8f4fb28e4f281bbc6e514e8f3_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
693ad4f8f4fb28e4f281bbc6e514e8f3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
693ad4f8f4fb28e4f281bbc6e514e8f3_JaffaCakes118.exe
-
Size
298KB
-
MD5
693ad4f8f4fb28e4f281bbc6e514e8f3
-
SHA1
3cb5bb6b20165ab404f9109e6a37d19b76e48a49
-
SHA256
16adf37262f86f735d64736a65a5fc3d4d6bc8b59761308d9d7d158e31142d23
-
SHA512
81b90394a7393764013df3d8cc31247018a5700fa111ac34475652d0723f28f84ca16c6b42255f5a419ce9e2bfc6414c39a131ffdbdbbeb00fd367e9bb374012
-
SSDEEP
6144:F4gKygecqPkZm5hzLf8bJZ7Jp31Q+b5A/oiKs7TLYC0JGRqSw:GpyRcqs85ONZ7Jlu/ovu4C0JFSw
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 3024 NvGfeService.exe 2912 NvGfeService.exe 2196 nvgfeservice.exe 792 NvGfeService.exe 1900 NvGfeService.exe 2152 nvgfeservice.exe -
Loads dropped DLL 2 IoCs
pid Process 1964 693ad4f8f4fb28e4f281bbc6e514e8f3_JaffaCakes118.exe 2912 NvGfeService.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvGfeService.exe = "C:\\Users\\Admin\\AppData\\Roaming\\NvGfeService.exe" 693ad4f8f4fb28e4f281bbc6e514e8f3_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3024 set thread context of 2912 3024 NvGfeService.exe 31 PID 792 set thread context of 1900 792 NvGfeService.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1936 PING.EXE 2676 PING.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3024 NvGfeService.exe Token: SeDebugPrivilege 2912 NvGfeService.exe Token: SeDebugPrivilege 792 NvGfeService.exe Token: SeDebugPrivilege 1900 NvGfeService.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1964 wrote to memory of 3024 1964 693ad4f8f4fb28e4f281bbc6e514e8f3_JaffaCakes118.exe 28 PID 1964 wrote to memory of 3024 1964 693ad4f8f4fb28e4f281bbc6e514e8f3_JaffaCakes118.exe 28 PID 1964 wrote to memory of 3024 1964 693ad4f8f4fb28e4f281bbc6e514e8f3_JaffaCakes118.exe 28 PID 1964 wrote to memory of 3024 1964 693ad4f8f4fb28e4f281bbc6e514e8f3_JaffaCakes118.exe 28 PID 3024 wrote to memory of 2912 3024 NvGfeService.exe 31 PID 3024 wrote to memory of 2912 3024 NvGfeService.exe 31 PID 3024 wrote to memory of 2912 3024 NvGfeService.exe 31 PID 3024 wrote to memory of 2912 3024 NvGfeService.exe 31 PID 3024 wrote to memory of 2912 3024 NvGfeService.exe 31 PID 3024 wrote to memory of 2912 3024 NvGfeService.exe 31 PID 3024 wrote to memory of 2912 3024 NvGfeService.exe 31 PID 3024 wrote to memory of 2912 3024 NvGfeService.exe 31 PID 3024 wrote to memory of 2912 3024 NvGfeService.exe 31 PID 2912 wrote to memory of 2196 2912 NvGfeService.exe 32 PID 2912 wrote to memory of 2196 2912 NvGfeService.exe 32 PID 2912 wrote to memory of 2196 2912 NvGfeService.exe 32 PID 2912 wrote to memory of 2196 2912 NvGfeService.exe 32 PID 2912 wrote to memory of 2448 2912 NvGfeService.exe 33 PID 2912 wrote to memory of 2448 2912 NvGfeService.exe 33 PID 2912 wrote to memory of 2448 2912 NvGfeService.exe 33 PID 2912 wrote to memory of 2448 2912 NvGfeService.exe 33 PID 2448 wrote to memory of 1936 2448 cmd.exe 35 PID 2448 wrote to memory of 1936 2448 cmd.exe 35 PID 2448 wrote to memory of 1936 2448 cmd.exe 35 PID 2448 wrote to memory of 1936 2448 cmd.exe 35 PID 2196 wrote to memory of 792 2196 nvgfeservice.exe 36 PID 2196 wrote to memory of 792 2196 nvgfeservice.exe 36 PID 2196 wrote to memory of 792 2196 nvgfeservice.exe 36 PID 2196 wrote to memory of 792 2196 nvgfeservice.exe 36 PID 792 wrote to memory of 1900 792 NvGfeService.exe 37 PID 792 wrote to memory of 1900 792 NvGfeService.exe 37 PID 792 wrote to memory of 1900 792 NvGfeService.exe 37 PID 792 wrote to memory of 1900 792 NvGfeService.exe 37 PID 792 wrote to memory of 1900 792 NvGfeService.exe 37 PID 792 wrote to memory of 1900 792 NvGfeService.exe 37 PID 792 wrote to memory of 1900 792 NvGfeService.exe 37 PID 792 wrote to memory of 1900 792 NvGfeService.exe 37 PID 792 wrote to memory of 1900 792 NvGfeService.exe 37 PID 1900 wrote to memory of 2152 1900 NvGfeService.exe 38 PID 1900 wrote to memory of 2152 1900 NvGfeService.exe 38 PID 1900 wrote to memory of 2152 1900 NvGfeService.exe 38 PID 1900 wrote to memory of 2152 1900 NvGfeService.exe 38 PID 1900 wrote to memory of 2408 1900 NvGfeService.exe 39 PID 1900 wrote to memory of 2408 1900 NvGfeService.exe 39 PID 1900 wrote to memory of 2408 1900 NvGfeService.exe 39 PID 1900 wrote to memory of 2408 1900 NvGfeService.exe 39 PID 2408 wrote to memory of 2676 2408 cmd.exe 41 PID 2408 wrote to memory of 2676 2408 cmd.exe 41 PID 2408 wrote to memory of 2676 2408 cmd.exe 41 PID 2408 wrote to memory of 2676 2408 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\693ad4f8f4fb28e4f281bbc6e514e8f3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\693ad4f8f4fb28e4f281bbc6e514e8f3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Roaming\NvGfeService.exe"C:\Users\Admin\AppData\Roaming\NvGfeService.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Roaming\NvGfeService.exe"C:\Users\Admin\AppData\Roaming\NvGfeService.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Roaming\nvgfeservice\nvgfeservice.exe"C:\Users\Admin\AppData\Roaming\nvgfeservice\nvgfeservice.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Roaming\NvGfeService.exe"C:\Users\Admin\AppData\Roaming\NvGfeService.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Roaming\NvGfeService.exe"C:\Users\Admin\AppData\Roaming\NvGfeService.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Roaming\nvgfeservice\nvgfeservice.exe"C:\Users\Admin\AppData\Roaming\nvgfeservice\nvgfeservice.exe"7⤵
- Executes dropped EXE
PID:2152
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Roaming\NvGfeService.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10008⤵
- Runs ping.exe
PID:2676
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Roaming\NvGfeService.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10005⤵
- Runs ping.exe
PID:1936
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD5693ad4f8f4fb28e4f281bbc6e514e8f3
SHA13cb5bb6b20165ab404f9109e6a37d19b76e48a49
SHA25616adf37262f86f735d64736a65a5fc3d4d6bc8b59761308d9d7d158e31142d23
SHA51281b90394a7393764013df3d8cc31247018a5700fa111ac34475652d0723f28f84ca16c6b42255f5a419ce9e2bfc6414c39a131ffdbdbbeb00fd367e9bb374012