Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 11:13
Static task
static1
Behavioral task
behavioral1
Sample
84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe
-
Size
9.1MB
-
MD5
84066d47170e1e02642690be0ca6acd4
-
SHA1
15d3b330c66c6bcf01e5b7574dc71b61ea2ca48f
-
SHA256
d6da9cd08fda82f36e277fcb9d98e1a0444d1cd3a3a71c6cf262e53213f7c1e1
-
SHA512
e386515f521cc63dd3561b260703e16cbe793315e9097e0eb23e8256dd40364da38007db1c2149ff4682d7df61c889f2de1c05821351fd8a1e87514ca70a0898
-
SSDEEP
196608:h0bDi3QWpZJdsYap39xyiSRQ6mUpUWiHoZyEAZ+FcAjoSZF:h0bW3QWDa0iSinUpUWiHowMcWoO
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2500 7za.exe -
Loads dropped DLL 2 IoCs
pid Process 2480 wscript.exe 2480 wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1068 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2828 PING.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2500 7za.exe Token: 35 2500 7za.exe Token: SeSecurityPrivilege 2500 7za.exe Token: SeSecurityPrivilege 2500 7za.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1736 2108 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe 28 PID 2108 wrote to memory of 1736 2108 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe 28 PID 2108 wrote to memory of 1736 2108 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe 28 PID 2108 wrote to memory of 1736 2108 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe 28 PID 2108 wrote to memory of 2480 2108 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2480 2108 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2480 2108 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2480 2108 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2672 2480 wscript.exe 33 PID 2480 wrote to memory of 2672 2480 wscript.exe 33 PID 2480 wrote to memory of 2672 2480 wscript.exe 33 PID 2480 wrote to memory of 2672 2480 wscript.exe 33 PID 2480 wrote to memory of 2500 2480 wscript.exe 35 PID 2480 wrote to memory of 2500 2480 wscript.exe 35 PID 2480 wrote to memory of 2500 2480 wscript.exe 35 PID 2480 wrote to memory of 2500 2480 wscript.exe 35 PID 2480 wrote to memory of 3036 2480 wscript.exe 37 PID 2480 wrote to memory of 3036 2480 wscript.exe 37 PID 2480 wrote to memory of 3036 2480 wscript.exe 37 PID 2480 wrote to memory of 3036 2480 wscript.exe 37 PID 2480 wrote to memory of 3056 2480 wscript.exe 39 PID 2480 wrote to memory of 3056 2480 wscript.exe 39 PID 2480 wrote to memory of 3056 2480 wscript.exe 39 PID 2480 wrote to memory of 3056 2480 wscript.exe 39 PID 2480 wrote to memory of 2832 2480 wscript.exe 41 PID 2480 wrote to memory of 2832 2480 wscript.exe 41 PID 2480 wrote to memory of 2832 2480 wscript.exe 41 PID 2480 wrote to memory of 2832 2480 wscript.exe 41 PID 2480 wrote to memory of 2896 2480 wscript.exe 43 PID 2480 wrote to memory of 2896 2480 wscript.exe 43 PID 2480 wrote to memory of 2896 2480 wscript.exe 43 PID 2480 wrote to memory of 2896 2480 wscript.exe 43 PID 2896 wrote to memory of 2828 2896 cmd.exe 45 PID 2896 wrote to memory of 2828 2896 cmd.exe 45 PID 2896 wrote to memory of 2828 2896 cmd.exe 45 PID 2896 wrote to memory of 2828 2896 cmd.exe 45 PID 2480 wrote to memory of 1068 2480 wscript.exe 47 PID 2480 wrote to memory of 1068 2480 wscript.exe 47 PID 2480 wrote to memory of 1068 2480 wscript.exe 47 PID 2480 wrote to memory of 1068 2480 wscript.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c echo hi2⤵PID:1736
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" C:\\ProgramData\\ppqvcxqjwx.js2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rd /S/Q C:\ProgramData\u55yu83⤵PID:2672
-
-
C:\ProgramData\tajm8\7za.exe"C:\ProgramData\tajm8\7za.exe" e C:\ProgramData\n3pn3b.zip -pvkd -y -oC:\ProgramData\u55yu83⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move /Y "C:\ProgramData\u55yu8" "C:\ProgramData\VkontakteDJ"3⤵PID:3036
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Delete /TN VK_DJ /F3⤵PID:3056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del /S/Q C:\ProgramData\n3pn3b.zip3⤵PID:2832
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 14⤵
- Runs ping.exe
PID:2828
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN VKDJ /SC ONLOGON /TR "C:\ProgramData\VkontakteDJ\VKontakteDJ.exe /H" /F /DELAY 0001:00 /RL HIGHEST3⤵
- Creates scheduled task(s)
PID:1068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD58909bd7fe908835145a9a0a749e1d110
SHA14b5ccdf348b9417073d0ceb3c33793b34fd3594d
SHA25687f4f79473aaa8538814f7c5dbeadc938e491d736a3d11cba747cb1fc91dc7b4
SHA512686dee7ef69c4bb1042c4056ddef3573ef0f1a1dd8af6695b128a4e4964cd2a88f83dcb1029d12b230f07e363603090cf5e113711bef39fe7da9ca456fb1bfd1
-
Filesize
490KB
MD5e127107063431e8186811bac98ad0b6e
SHA127a508f87621792f102ed1d97e7689801132c13f
SHA256c04672f2cdcba81fb8a6d9a0e47b3f28605e3b020c8dc37657f932c7d981dad9
SHA512c88edce031d5d73a4f443dc31e2d204f650f876ad2fa517d3e47581fa48cdc93afbb4941bdc6f0b44060d209d59406bd855feadf0b18de30f27c3d61580b0661
-
Filesize
4.4MB
MD5a8d9303da2f0e4fda184aa53971ced81
SHA14c324e086b8a18e7d8ff18097acfaaa8522fedc7
SHA256049e37f3d4ac9980a21a3b0833bc5a30183255df0cff0162a22b4206f959b707
SHA51252627edd2ca46a4edf9231e001ce09d07ff9bba698da93a9c80de4be186bd479b036763cc59992a40f23467901993b6f4804a7231d730b4e007f2ca14bb937c5
-
Filesize
4KB
MD532ebed61c8f61c18b2383cb9511588a6
SHA11ea5052c738780000cbf9f6409069c289573f4ab
SHA256a861e6d41cb838f1d90503b1d7858b26c81f43ef8beb5584a23345505dc82862
SHA512050018c531aefaf66b937011d10519d9b7176e66d03f15f1d053be36b8560f18be01fb0a307452c592c193cfb6e81cbea90707007cd32522f9d39a0c07f64c3d
-
Filesize
722KB
MD543141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc