Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 22:20
Static task
static1
Behavioral task
behavioral1
Sample
6ff9be087d7b636e2ed181446066edbd_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6ff9be087d7b636e2ed181446066edbd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6ff9be087d7b636e2ed181446066edbd_JaffaCakes118.exe
-
Size
685KB
-
MD5
6ff9be087d7b636e2ed181446066edbd
-
SHA1
16a1647187b6b3b379a9dbe5c63f610bab155bc4
-
SHA256
b1d312881bcc1399da0560b99b0204dc19ae1f867df5642ec0bcc5254c1ae1fe
-
SHA512
e7b39fac40f665d71ac82203f53261dc6ba497200e034fb7a27c2021dec778be66856a45acb73eebbefa02d59df40c1b8703fadafcef6033d1ecb5bf81dbc884
-
SSDEEP
12288:xSnvpg3jf39d4+MkbGKGd4Zfuh2CN+sid3Bfz1aHggnE2yPLol:xSnvmTf3j4+MkbDGmnCN+td391aHggnP
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2160-1-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-5-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-6-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-160-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-162-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-163-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-164-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-161-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-210-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-212-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-211-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-233-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-234-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-232-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-231-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-235-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-237-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-238-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-239-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-240-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-241-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-242-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-243-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-244-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-245-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-246-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-247-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-248-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-251-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-252-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-253-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-254-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-255-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-256-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-259-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-260-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-261-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-262-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-263-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-265-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-268-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-269-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-270-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-272-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-273-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-274-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-276-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-278-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-279-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-280-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-281-0x0000000001D20000-0x0000000001E65000-memory.dmp upx behavioral1/memory/2160-282-0x0000000001D20000-0x0000000001E65000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main 6ff9be087d7b636e2ed181446066edbd_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2160 6ff9be087d7b636e2ed181446066edbd_JaffaCakes118.exe 2160 6ff9be087d7b636e2ed181446066edbd_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2160 6ff9be087d7b636e2ed181446066edbd_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2160 6ff9be087d7b636e2ed181446066edbd_JaffaCakes118.exe 2160 6ff9be087d7b636e2ed181446066edbd_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ff9be087d7b636e2ed181446066edbd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6ff9be087d7b636e2ed181446066edbd_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
8KB
MD521d6dea4d929ac6fd44b9c3fb474c851
SHA1549ba09d77213996b24e0a89fb203b56f98ac58a
SHA2562dce594111ccd516b58e6d4ebff52fa481a7d34dcf91ddf0ab2ea634bf92e4d6
SHA512522de64c768f94362d64ea0eaf527409182efd422b39d4c14aeb86c0b7c09626ee07278e1dd33ca94773191a8bc1c3cbe0738c8f29fb2d4662be25b03e243ac6
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
5KB
MD5b1bc1fed5f5b2ad678445c89007aa890
SHA1bfade55a086e140f295b0fbe695e5ca2cacc8430
SHA25672e5e20eee4bb97d2564a45d21d3f202091afc847baa185890e236c143673d0b
SHA512485aa57091e6a8be2868fdf2593b988823bac459fed779689c3f1f74cf81885a7d225adfd124df93364dda1517c73c84c453b53276af13519c8486f72cb6314e
-
Filesize
207B
MD5c222a4f3d309721c0898606960120266
SHA1cdee967961a3ea87565ae7ca287be8ed20496160
SHA256f638cc042b7ade6f43f2faf0077e020137562e559178396b7e975db39ac13df6
SHA512db52224964ffd03fa65fddabea29d4f7c23840a18d1ad1028f228589c8c642280a762d2f4250159106f911455b8f0706a3b204dcbbb0484638d4f41f4f54a836
-
Filesize
207B
MD5f5bdb3cabdc15580d97fa94aa3397c08
SHA1d73b3bc67c9fe124768697cee7eec84c2b1eee4f
SHA256b28db98f2a6b06b6783b8fca6aabdcb89234d5bd4306fa71711988dba1fc71ea
SHA512511de8d97853457a37f89550f4b283ed69c05efdb7ce63657bc53b4e37ddf357577738be92da4bcd736d9c3c181c5ffc50b890c8cd5aa27099a87acf2c600fad
-
Filesize
846B
MD5f6a0a0c082bc7ddc1e0e599493949e1f
SHA173b63bb6233e0e27b58ccdcb4ac32b05e36ce046
SHA256b01fb9069f905b1f8ec3b72937e1a7a415fa62ee289aa79c68f65eee43bdd762
SHA512ed5176bb258835a6346322a0ec0564557da28484a7bcc014ad1fcc337b14518b98e37475e41e6ae29cb724333e1c8471dd0f48bcf2a0d4cff522fb15e097716b
-
Filesize
863B
MD5aebc9f7755027a8790663b5d74088c42
SHA1d567455a3e106cd5f456b1b0f395a0d0336aaa27
SHA256b3f34c560de55adc8c9eadef4a7779f2d2e6ee0997c340d8f10a8dda63c86696
SHA51253d4ce45e5c943c11d7951bc9f6563d3365ce36786ddc952bf6b3469b46a2c326410da29aff1061b21800b1cfff3088e3f3dfcad9f34a0962d069dd3a6fea3ee
-
Filesize
1KB
MD561b27f16ef13d3ad95833dd3a932f307
SHA19e0866a07c8309b8f5fb3fbec98531f2ebfbce6f
SHA256be3dee9b5d9f2893607ff916b3c3313987a16092230650dbaeec6e9e36c63ad2
SHA512c3d6a15a826c990bd77c4d2581fe8791fb71346477ee360af50f96a7521e83f5ae89c520af221a737787684eb2b6a714afe9e6d770d9103de4fcc18f767283a0
-
Filesize
1KB
MD5aa1424f218bf3befbcca3c4c0e42a365
SHA1c91d5dce4ebd543d905026577f8a05dff1d8357e
SHA256e1a823582add59d1406fd36d3f7f86f98873e3201168e542cb49239d6c525ab0
SHA5128ef2ea9613ff50bf028c9ef4611326d61b1cd07d01b89631faa2053449fab9a746e06e59a176dd5cda4f02f77fca8eedbb6e46ae4a78afa416ae8adb7ef0d93b
-
Filesize
10KB
MD557ca1a2085d82f0574e3ef740b9a5ead
SHA12974f4bf37231205a256f2648189a461e74869c0
SHA256476a7b1085cc64de1c0eb74a6776fa8385d57eb18774f199df83fc4d7bbcc24e
SHA5122d50b9095d06ffd15eeeccf0eb438026ca8d09ba57141fed87a60edd2384e2139320fb5539144a2f16de885c49b0919a93690974f32b73654debca01d9d7d55c
-
Filesize
493B
MD5818b8908ace0ccc5fecbca20f2919587
SHA1e599b4229d622c36bc6cd5b155c94c50d1a68b86
SHA256ad2ec992fc336af09f7be4a652d240936a08bf522d10ff7fbec5dbfe0c4d332d
SHA5127d63287a12f519524146f7ed620aee6724489fa351752e7eb64e99fae098e524e744e570d2b7abc21f89064cff2bdaa9864f7f0cda9fb9ca861d1df9a45bcd9f
-
Filesize
104B
MD535a600a752d3074501de31a516860499
SHA151eac62cf77a0b88a3e9cb9ee6f85def21fd4bcf
SHA25614e064857751b23da7bbe40861ef4caf99b2496227507b8e3108fbac6d901f75
SHA512046ec179571d239bfb2d51be9837f96d9afebf2e5db77bba0f4a25ce8716d37581a3f9753bd2dbb04c47711699a9d93987bceb71df0b8becf8c577d660320069
-
Filesize
812B
MD5eabb61abba55f80af418fa1128d1548d
SHA1a5ee1d55de2cc60966039120c830fc19cefb0351
SHA256717f3f02f5d5fd1478b6d2ec44acef6e70bb8f1adcf2dc030c08b92e851737e1
SHA512d232072c9540bf0e2fd56f353c2cc83518eabf8282cc02d9f8bec81c0341287ada29ba79f2a515d68722658686b6cce97be138a48f44409562d9a567af200bd6
-
Filesize
221B
MD507cd59b954e8495ad6cd6a7c11d2de86
SHA1787aeda3eee8053705fb208a6b399b8340820b82
SHA2566e6b964fd79b4a3461f128e2ed145b9b641d108b8616695f36387661cae995bb
SHA5120159aca0c2a49393fd91acd4b6819217e67f8fd01e220297eb3e0fdd8132fad794fc317f5cc5e2b761d4123da71478b97df776908de6740eb6d54187c6c00754
-
Filesize
681B
MD55f8dcbf4ebc42ad95cfc4d9401283972
SHA1e4060ea37daa2953bfdf8a773e447143f6365e75
SHA256931193720d26f0007ad223fca1a440f4866047a0ca96f5d29de3e62e7ba6a731
SHA512f918c4b834dff01c82f4b0063708d9155aef87b40fa3ae101d5d0a761ed17a348ff6ba4fb5f1e6ba4921698dcbb3e8291a25e48d180092107cb05660d948a61d
-
Filesize
19KB
MD570e70599d4b853df0f12f6cb0e04695f
SHA16e3a721aef65625bf99b639800476150d262dd4b
SHA25687af4027e8f89459463bdd73df7b928b883eefb20514159d3a1a4be0d39e00c0
SHA5121efcf8af09cf857b3850cec43a88fc8c0992e3b04f78ad2c71b84c2ac7775e745df211582694588b29217aefb1ae02b29b94c2cfe52b5d32bdafb9dce73b9920
-
Filesize
27KB
MD51cc2677e3e29e45e538985839cff2b42
SHA12dab653eb20be72b034a38dc1fcebbd18f079c86
SHA2569216d98a6574dfadacdc8321dc435454cb72c589b3ee8326a9b946966f756d7f
SHA51225575fea9abb1491b5a5853244a9b655ce05f64d98f4b79134674f2d9a560a5af405c1783c9da4a07cfb38b51d060c7a70890c70df6c1c8f4b01e041aa4f649f
-
Filesize
2KB
MD5e3758d529f93fee4807f5ea95fbc1a6c
SHA13a9a1ba234e613e5f808c3ffeda05a10a5dafe00
SHA2568d46eb0c60043dcb7d79ab3d0525148fc901764620c02e4b9c5dd8b0e9026303
SHA512e891552bee3aa10247cad1fcc510331077016a6e71d46827be2dd46017f943c5acc2c1506b41217880d35d52a94989923ad0a345f8791da4bb379eceefe3c407
-
Filesize
3KB
MD5838bb977e85d67f57ee26f454efcab3f
SHA1ea53b761be427015efbd9ba082e16ff3f14142bb
SHA25608cd2a5f2633780ae360e3a27c24c4c400aba19bbfc0112524b58d90a35a8869
SHA512a585178923cc095df9d54117cbc8d7775dc6d89d03b065b07134ba9b2130c897d58012deeb1e4deb46e16f8d4b0029943ab3d4c2ba69c86717e70e1a58d2d4c5