Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 12:54
Static task
static1
Behavioral task
behavioral1
Sample
8713a0f9fefb9731a3db12a7bbe1af1d_JaffaCakes118.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8713a0f9fefb9731a3db12a7bbe1af1d_JaffaCakes118.jar
Resource
win10v2004-20240426-en
General
-
Target
8713a0f9fefb9731a3db12a7bbe1af1d_JaffaCakes118.jar
-
Size
172KB
-
MD5
8713a0f9fefb9731a3db12a7bbe1af1d
-
SHA1
155051100c5e7064120c2464cbfdf295d501c73d
-
SHA256
a3d5b263586c997d4420565fea863dca93697b1587e6e72fce36b96a8e55ae27
-
SHA512
1176785464090da21f282173ff324eaad0dbc9137dd079761d19f1f042eb46bb977b877b1871edf66a3eb884b552efa8e36416dd27a8bfdf39db0cc97d8eee55
-
SSDEEP
3072:SZgrT+w64J8ZmJZuWhI/PZQ2xKwVIvrQnbn5BlIuFAm9I68oym1rV:Sqr6wP+mfuPZr0EnbnflIUx/8rGV
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 448 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5056 wrote to memory of 448 5056 java.exe 83 PID 5056 wrote to memory of 448 5056 java.exe 83
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\8713a0f9fefb9731a3db12a7bbe1af1d_JaffaCakes118.jar1⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5bf632d9302ea4a71e600ef7a92a2e76a
SHA1fa09758f8c32ead0e5221bf209e5a0b0be54c46f
SHA256bc9660d133824a855c26d13e3b75a26b23330adeb2ee7568c1504807b3ff04ec
SHA5129a2405f32f40ac5c07a407ae1103937d20c85ed0b624cf927fb3443c4d84f4ecd121a964b4f4979c5d3518ccd853f8c62341f2cdfefb36307f8b12e2749d1400