Analysis
-
max time kernel
141s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
9d5288c90e281007e7096426f65dfe8d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9d5288c90e281007e7096426f65dfe8d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
9d5288c90e281007e7096426f65dfe8d_JaffaCakes118.exe
-
Size
681KB
-
MD5
9d5288c90e281007e7096426f65dfe8d
-
SHA1
90061a84aab0b6fbaa99012b5ebf063501682a01
-
SHA256
17d0fc4ba8550635a1291a73b9f25418e980ee8dcec9584f70bce608133c7a9a
-
SHA512
616722905179ff18a7647660cd111ba1d74eb7676e8920331e359fc4992f9ca3d0ea9899d122d52887b1ff48f79b77a4147b58b310ea66fc34d96359fb5240fe
-
SSDEEP
12288:Lnvpk0NU6tZXhh671gjdQ6GjtTXBxamXRMlZCtvkHchqVe214Ucx6:LnvS2bZXv6hMQjt/ayRwyW0m2
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/836-0-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-6-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-5-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-112-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-114-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-115-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-113-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-116-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-135-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-137-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-156-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-158-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-157-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-159-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-165-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-186-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-187-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-188-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-189-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-191-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-192-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-193-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-194-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-196-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-197-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-199-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-201-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-202-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-203-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-207-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-209-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-210-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-212-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-215-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-217-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-218-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-220-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-221-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx behavioral1/memory/836-223-0x0000000001C60000-0x0000000001DA9000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is259400677.log 9d5288c90e281007e7096426f65dfe8d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main 9d5288c90e281007e7096426f65dfe8d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 836 9d5288c90e281007e7096426f65dfe8d_JaffaCakes118.exe 836 9d5288c90e281007e7096426f65dfe8d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 836 9d5288c90e281007e7096426f65dfe8d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 836 9d5288c90e281007e7096426f65dfe8d_JaffaCakes118.exe 836 9d5288c90e281007e7096426f65dfe8d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d5288c90e281007e7096426f65dfe8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9d5288c90e281007e7096426f65dfe8d_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
6KB
MD577773556509a3371c66bae024e88ffea
SHA1b760a3b4763cf523be23d1f7b649681ec3346372
SHA25687e523e7aedfa6f7962044bcc960fb36c3bf750d514ef1acca42b17f4d52a705
SHA512a88f49c191e59c5b5f468005ca73dc5d2672778dc06a924feb64806f0cbc1960cba2cf2ad276439572910b4a6c3b389aee1b5122635aa43bbaa5689271f55910
-
Filesize
1KB
MD5e9f12f92a9eeb8ebe911080721446687
SHA11fb34409373b6ce2abee20d60947f1357f30e248
SHA256c1cf449536bc2778e27348e45f0f53d04c284109199fb7a9af7a61016b91f8bc
SHA5121b213f089da5502986da85f21673a522b36ceb4aec26bb1dffa809c58511056602cc0b99ab21ab206e2466928be0cdee7c7a95b39dc1183d8cfb529a22fe07c8
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
21KB
MD5e4f15874b7d6a90e64364a02269bc4df
SHA163e6ea43b6f890cb00dab260967723730f525cb0
SHA2561d4313dacef0bbf110c9f7b8bf4035334a6f7c9f2e05caa775aef936e4fb69d3
SHA512fc707be1c0209b83f4403e95d2c2b67703d68309b6d27842d596c44179980c29e020a639b90956b79e4661c1e82f8ab615a054475c66d855b49669d7f20ebd35
-
Filesize
293B
MD575a9464e6e2e2d8efc82e5285ab0d95d
SHA103aa7ccf18666265cef894adc30aede977116405
SHA2567ec62b84d0c741b8e1f4c735ba37fd4dc889690590cf900073793b8d6e44cd0a
SHA512c52d190454e7d6fbafdd18960b5c95cc76da66ce02b7d0caf1eecc3335ae60b8aeb8b014be9adfaf46cafcdb7342029ec265d64576483cfc2b2439a514d9b63c
-
Filesize
294B
MD5aa5fc77754056e5cf059ae73ae3ffb93
SHA1d6dea0e225dc926506c9c1bc8d9084cbaf7cc350
SHA256cb4b816b428001c2756dc75791598a256ff2774c5dc9e87253ae77b5aaed8da0
SHA5121c61531ed01bd48af185450f64f6a908784a4846085044109cf18f385592f783ae6c9b99cffe95b4d6fc1108fc2cebdfeccca30a01c682f5d47b019429b0e8a6
-
Filesize
1KB
MD560147e3f18555ea3b6a8aa7f7d5ec4f7
SHA152b308ab2c723c4a95a1218cf5f6d6d376ae50c9
SHA256b7861c8b3c8aaf75c6b915f9b0fb561949de5625e713970639c9c7f52cc157f9
SHA512e6a3d489bad7122dc81665ca59583401f2c6659aa0f61f969dd64247adce3eeb54719392f13baf09882f3bab6b5f7f28e3f663a1a921997218d4c7f0a29d93f8
-
Filesize
1KB
MD597dce4b9ac73486feacecd8b4a3b9186
SHA1c9aa6bf98fcf33e423cac9585f46fb661a2431e0
SHA25672b1ea3e029a939c6fc0851c422787319c61d3b9a1945b82e193ed255fbcdab2
SHA5122a86cbd94333a4750be7a6a53f0e655f4843cd4584eef5c8f8172ba25e88c0fda4f2e7d903d5cd76ed38a714a00305b5a29a620df1ef515b6949578d3108712f
-
Filesize
1KB
MD594cff096cae7f90af8db4d4113e5dafb
SHA1bf1daf81dd18c0fc72c403514b2880088549c689
SHA256e6d91d3be5902fdb8f296d54631499df31d8ade6299dd78e902d7578b4d15e18
SHA51229360549eb7a722fd357e6f0ca5d06bddd05ff096e0a8301cf8d14c0195a3b3aed9351a8f2665199ecc9538b5c954738efcffdbd33654868fd2ba8a8355cf9a3
-
Filesize
1KB
MD50430f4b4f794e57c8d2b4b3b8866d2ce
SHA137d5844d964a4a486d6d3c8687dae03b224e13c6
SHA25684dd580b596a809dc8153a492b2ee8c5f176fed8d2947eab0dc3b3a172efe0c9
SHA512bcf902320766e08d7cb7b4b8c6b84d6533fa593f0e8ce2a799b49c3cff0d49316fee8593587c4010878b83d550d502f6fabe0f4213bd0862dba46480468a60f5
-
Filesize
10KB
MD557ca1a2085d82f0574e3ef740b9a5ead
SHA12974f4bf37231205a256f2648189a461e74869c0
SHA256476a7b1085cc64de1c0eb74a6776fa8385d57eb18774f199df83fc4d7bbcc24e
SHA5122d50b9095d06ffd15eeeccf0eb438026ca8d09ba57141fed87a60edd2384e2139320fb5539144a2f16de885c49b0919a93690974f32b73654debca01d9d7d55c
-
Filesize
5KB
MD545d8e7f1e721db59eca3dc36e932bf8b
SHA1974fbb730c8c1ae66c6187f99d887f44d8a77a56
SHA256f8cfaea0b23c976a4e7a67ffe79dd82210c5fea7d6eba2383a3cc33f8802ae05
SHA51285b671dc81758977e5f807af91333573e1733ce8ca6721100dbe8538a481d8811d6d36754517948ff6a5ad984bb5ed0724790f43ba30dafdafb8c94735e249bc
-
Filesize
1KB
MD59949492ba54aee4340b57282e05a978d
SHA1bed6e0f47e77858d54178467e15a0829fbade193
SHA2568721078a45e67b58a01633cf207467ad7c096a0cf23191ebbe3660c8256bb695
SHA512f2e5adebf9d3c74c0adb5246ec5880be05ee265844afef3eb1ee92a8c26db273f15c8a534fced1485dca61ad2f96d1c625645172b44f34388d3a6afa0efa4414