Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
89b2857ccf2a37bc12367c8b1231d99b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
89b2857ccf2a37bc12367c8b1231d99b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ooi.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ooi.dll
Resource
win10v2004-20240508-en
General
-
Target
89b2857ccf2a37bc12367c8b1231d99b_JaffaCakes118.exe
-
Size
582KB
-
MD5
89b2857ccf2a37bc12367c8b1231d99b
-
SHA1
297094770c16014e9ecbb6b1c742b3a840c38d26
-
SHA256
06ed64e01f377e0ac4d3c2300137be88607e6b759da60356b82bf72e39d13f14
-
SHA512
77da46579b6c04a8487aa87ee19457e409196e306a91841e4c327bbfa9095ce1a791015b53f59bc24efe72072070834de03aa8e5a73d4e5263e8a0f33bd6c267
-
SSDEEP
12288:4beYAMlDma0n9VlxuiLGxjHxobyJazBoIJR9Y66FS:4iYFBmaI32iQjHxoemoIVYK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2980 bccbcabeddccf.exe -
Loads dropped DLL 10 IoCs
pid Process 1492 89b2857ccf2a37bc12367c8b1231d99b_JaffaCakes118.exe 1492 89b2857ccf2a37bc12367c8b1231d99b_JaffaCakes118.exe 1492 89b2857ccf2a37bc12367c8b1231d99b_JaffaCakes118.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2768 2980 WerFault.exe 28 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2584 wmic.exe Token: SeSecurityPrivilege 2584 wmic.exe Token: SeTakeOwnershipPrivilege 2584 wmic.exe Token: SeLoadDriverPrivilege 2584 wmic.exe Token: SeSystemProfilePrivilege 2584 wmic.exe Token: SeSystemtimePrivilege 2584 wmic.exe Token: SeProfSingleProcessPrivilege 2584 wmic.exe Token: SeIncBasePriorityPrivilege 2584 wmic.exe Token: SeCreatePagefilePrivilege 2584 wmic.exe Token: SeBackupPrivilege 2584 wmic.exe Token: SeRestorePrivilege 2584 wmic.exe Token: SeShutdownPrivilege 2584 wmic.exe Token: SeDebugPrivilege 2584 wmic.exe Token: SeSystemEnvironmentPrivilege 2584 wmic.exe Token: SeRemoteShutdownPrivilege 2584 wmic.exe Token: SeUndockPrivilege 2584 wmic.exe Token: SeManageVolumePrivilege 2584 wmic.exe Token: 33 2584 wmic.exe Token: 34 2584 wmic.exe Token: 35 2584 wmic.exe Token: SeIncreaseQuotaPrivilege 2584 wmic.exe Token: SeSecurityPrivilege 2584 wmic.exe Token: SeTakeOwnershipPrivilege 2584 wmic.exe Token: SeLoadDriverPrivilege 2584 wmic.exe Token: SeSystemProfilePrivilege 2584 wmic.exe Token: SeSystemtimePrivilege 2584 wmic.exe Token: SeProfSingleProcessPrivilege 2584 wmic.exe Token: SeIncBasePriorityPrivilege 2584 wmic.exe Token: SeCreatePagefilePrivilege 2584 wmic.exe Token: SeBackupPrivilege 2584 wmic.exe Token: SeRestorePrivilege 2584 wmic.exe Token: SeShutdownPrivilege 2584 wmic.exe Token: SeDebugPrivilege 2584 wmic.exe Token: SeSystemEnvironmentPrivilege 2584 wmic.exe Token: SeRemoteShutdownPrivilege 2584 wmic.exe Token: SeUndockPrivilege 2584 wmic.exe Token: SeManageVolumePrivilege 2584 wmic.exe Token: 33 2584 wmic.exe Token: 34 2584 wmic.exe Token: 35 2584 wmic.exe Token: SeIncreaseQuotaPrivilege 2744 wmic.exe Token: SeSecurityPrivilege 2744 wmic.exe Token: SeTakeOwnershipPrivilege 2744 wmic.exe Token: SeLoadDriverPrivilege 2744 wmic.exe Token: SeSystemProfilePrivilege 2744 wmic.exe Token: SeSystemtimePrivilege 2744 wmic.exe Token: SeProfSingleProcessPrivilege 2744 wmic.exe Token: SeIncBasePriorityPrivilege 2744 wmic.exe Token: SeCreatePagefilePrivilege 2744 wmic.exe Token: SeBackupPrivilege 2744 wmic.exe Token: SeRestorePrivilege 2744 wmic.exe Token: SeShutdownPrivilege 2744 wmic.exe Token: SeDebugPrivilege 2744 wmic.exe Token: SeSystemEnvironmentPrivilege 2744 wmic.exe Token: SeRemoteShutdownPrivilege 2744 wmic.exe Token: SeUndockPrivilege 2744 wmic.exe Token: SeManageVolumePrivilege 2744 wmic.exe Token: 33 2744 wmic.exe Token: 34 2744 wmic.exe Token: 35 2744 wmic.exe Token: SeIncreaseQuotaPrivilege 2520 wmic.exe Token: SeSecurityPrivilege 2520 wmic.exe Token: SeTakeOwnershipPrivilege 2520 wmic.exe Token: SeLoadDriverPrivilege 2520 wmic.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2980 1492 89b2857ccf2a37bc12367c8b1231d99b_JaffaCakes118.exe 28 PID 1492 wrote to memory of 2980 1492 89b2857ccf2a37bc12367c8b1231d99b_JaffaCakes118.exe 28 PID 1492 wrote to memory of 2980 1492 89b2857ccf2a37bc12367c8b1231d99b_JaffaCakes118.exe 28 PID 1492 wrote to memory of 2980 1492 89b2857ccf2a37bc12367c8b1231d99b_JaffaCakes118.exe 28 PID 2980 wrote to memory of 2584 2980 bccbcabeddccf.exe 29 PID 2980 wrote to memory of 2584 2980 bccbcabeddccf.exe 29 PID 2980 wrote to memory of 2584 2980 bccbcabeddccf.exe 29 PID 2980 wrote to memory of 2584 2980 bccbcabeddccf.exe 29 PID 2980 wrote to memory of 2744 2980 bccbcabeddccf.exe 32 PID 2980 wrote to memory of 2744 2980 bccbcabeddccf.exe 32 PID 2980 wrote to memory of 2744 2980 bccbcabeddccf.exe 32 PID 2980 wrote to memory of 2744 2980 bccbcabeddccf.exe 32 PID 2980 wrote to memory of 2520 2980 bccbcabeddccf.exe 34 PID 2980 wrote to memory of 2520 2980 bccbcabeddccf.exe 34 PID 2980 wrote to memory of 2520 2980 bccbcabeddccf.exe 34 PID 2980 wrote to memory of 2520 2980 bccbcabeddccf.exe 34 PID 2980 wrote to memory of 2704 2980 bccbcabeddccf.exe 36 PID 2980 wrote to memory of 2704 2980 bccbcabeddccf.exe 36 PID 2980 wrote to memory of 2704 2980 bccbcabeddccf.exe 36 PID 2980 wrote to memory of 2704 2980 bccbcabeddccf.exe 36 PID 2980 wrote to memory of 2968 2980 bccbcabeddccf.exe 38 PID 2980 wrote to memory of 2968 2980 bccbcabeddccf.exe 38 PID 2980 wrote to memory of 2968 2980 bccbcabeddccf.exe 38 PID 2980 wrote to memory of 2968 2980 bccbcabeddccf.exe 38 PID 2980 wrote to memory of 2768 2980 bccbcabeddccf.exe 40 PID 2980 wrote to memory of 2768 2980 bccbcabeddccf.exe 40 PID 2980 wrote to memory of 2768 2980 bccbcabeddccf.exe 40 PID 2980 wrote to memory of 2768 2980 bccbcabeddccf.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\89b2857ccf2a37bc12367c8b1231d99b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89b2857ccf2a37bc12367c8b1231d99b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\bccbcabeddccf.exeC:\Users\Admin\AppData\Local\Temp\bccbcabeddccf.exe 8-0-7-8-5-5-2-7-8-5-8 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2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81717225616.txt bios get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81717225616.txt bios get version3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81717225616.txt bios get version3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81717225616.txt bios get version3⤵PID:2704
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81717225616.txt bios get version3⤵PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 3683⤵
- Loads dropped DLL
- Program crash
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD59025468f85256136f923096b01375964
SHA17fcd174999661594fa5f88890ffb195e9858cc52
SHA256d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA51292cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51
-
Filesize
826KB
MD55ec5248a28d1083611587b4c276d9d9d
SHA12f0f2ebee55c1e52e0358d18a7d9dcace60745fe
SHA2566c29cdcbac487f7238560b3513573d4ba1975b843ade5cce2d68513f4beb7efc
SHA5128c1fe4feb2123b5ea5946ee368816188b04672aab342a569f4cf209507e788993300309fabba096d3e9b891f6e1500429bbac75806537e441487cee80034e2cf
-
Filesize
40KB
MD55f13dbc378792f23e598079fc1e4422b
SHA15813c05802f15930aa860b8363af2b58426c8adf
SHA2566e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d
SHA5129270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5
-
Filesize
122KB
MD52690b36fa914f15c6532dbc1a4f1158d
SHA18f0d38bcb9081058c8c249b12994004f5115c70e
SHA25670f39e836f56eee07099c64d28dda45cf3176eb808f38833b732fb5b5318accb
SHA512d2092cfc876ff2fb0686b577a6ef82dca43ec3eb91c7547103f34bbc88b3fbe93c67a864f0501aa4f07b004c0493fda6822292247623bbc30de2a6ff9ecd00c0