Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.exe
-
Size
419KB
-
MD5
87828a8fa2d5ad64032f99c98a7e3e34
-
SHA1
ca849737734d3d473eb7f05335e649c465a26cc7
-
SHA256
1166ef0d9c2e0bf062895816edf1c204bca65543d10038afd30a28a7ef0c8482
-
SHA512
47dd48869deca157e3b48c4f715a3fd7835a0760f983cf486d2fdbe6ee70e1ae1add4664ceebc2fedd14f681030963a1bf0b1ca9372058ad7fd31a94814124a6
-
SSDEEP
6144:J/QiQPqXdEOdEoj1Z6xFO+nl6a5H/xXyVlcG40eAw38o85XOC8T/FUyKGpM9CIT1:hQiGqXSh/Jl6a5HSlcGpX98iR4o
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3052 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.tmp -
Loads dropped DLL 4 IoCs
pid Process 2904 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.exe 3052 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.tmp 3052 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.tmp 3052 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.tmp -
Checks for any installed AV software in registry 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\K7 Computing\K7TotalSecurity 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.tmp Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Sophos\Sophos Anti-Virus 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.tmp -
pid Process 2680 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2680 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3052 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2680 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3052 2904 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.exe 28 PID 2904 wrote to memory of 3052 2904 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.exe 28 PID 2904 wrote to memory of 3052 2904 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.exe 28 PID 2904 wrote to memory of 3052 2904 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.exe 28 PID 2904 wrote to memory of 3052 2904 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.exe 28 PID 2904 wrote to memory of 3052 2904 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.exe 28 PID 2904 wrote to memory of 3052 2904 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.exe 28 PID 3052 wrote to memory of 2108 3052 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.tmp 29 PID 3052 wrote to memory of 2108 3052 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.tmp 29 PID 3052 wrote to memory of 2108 3052 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.tmp 29 PID 3052 wrote to memory of 2108 3052 87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.tmp 29 PID 2108 wrote to memory of 2680 2108 cmd.exe 31 PID 2108 wrote to memory of 2680 2108 cmd.exe 31 PID 2108 wrote to memory of 2680 2108 cmd.exe 31 PID 2108 wrote to memory of 2680 2108 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\is-NGHFI.tmp\87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-NGHFI.tmp\87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.tmp" /SL5="$400F2,139536,56832,C:\Users\Admin\AppData\Local\Temp\87828a8fa2d5ad64032f99c98a7e3e34_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-TU3P6.tmp\ex.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -NoProfile -NoLogo -Command "& {$avlist = @(); $os = Get-WmiObject Win32_OperatingSystem; if ($os.ProductType -eq 3) {Write-Host \"ServerOS|0\";} elseif ($os.Version -like \"5.*\") {Get-WmiObject -Namespace root\SecurityCenter -Class AntiVirusProduct | ForEach-Object {Write-Host \"$($_.displayName)|$(if ($_.onAccessScanningEnabled) {\"4096\"} else {\"0\"})\"};} else {Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiVirusProduct | ForEach-Object {$avlist += \"$($_.displayName)|$($_.productState)\"};Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiSpywareProduct | ForEach-Object {$avlist += \"$($_.displayName)|$($_.productState)\"};} Write-Host ($avlist -join \"*\")}"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5f8f8258012893e0a2c957d226bdd7587
SHA1ed482b5f912ef2d31e2b231df6b6e3b64967390c
SHA256c341965a331692b4f79eed856a7da98c550d74fdef27d1241893284f1b51c3d2
SHA5126e563814e4347ffa1da1d4d26ab45430987d5224c22278e1ee41b207700eb263aaab1e69088a5eeb267fdd385f36a61c0c66415f5df0887162eefbcbec9d19d1
-
Filesize
786B
MD58a963928d254c3dcf0654bb5c7d0fade
SHA1557d4d75e402d0bb809fd58ae629a966402a8fd7
SHA256968a65c207b8c0d236d00e15d033b44a2af62369dcd8a87a642fb1867bdbc77c
SHA512a3e31d2778c888b679dc29b204caa233688b1605d10647e1148a8632164c4e9f23bdea71c37d62948b910e9aa55b6cf14486a9ac79ab5c9db0704d202a906106
-
Filesize
694KB
MD586462bc76b244bac73ee6ffe47354be2
SHA1c66462dc233887f86f9e05ee36086de4edfd99b6
SHA256e3da91f01ffb504352b5e8237a5465d0f492a750a7c9a6cef22b3a5d08230fc9
SHA512c0cbe3a39c2fd18e257500faacafd9fc8913221278e492b355acf64e6d97ff622a46a325a5c18cee5843a1660fda64dbc3172fac642de77ed12321085d67cb65
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
202KB
MD5640c2525d575a42c3be5af4609f135a3
SHA168d544c113116936be03c3a90f0ac47e16c15f25
SHA256b1ed2f6d034aca5804da15d954c66d9942e90f8287812ea55e7f8f9e5c04081c
SHA512f1c2c18ade52b39724a69ea361a37b791480e515ba7e93aca5f8e1f8d3ceeb40ef00b068ce7fef8a213311c9b525f47f62616972796baf3e89eed719b97fbe9b