Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
a22d248f967f87d8b08d1fde206e125b
-
SHA1
6b4a8ecb55b9b19f4ba702ceb93535de8a0d901c
-
SHA256
16da066037834fe3cbd12a245d7e472058701686b2c8e8a071b641fed62654d4
-
SHA512
7ba183d80135658d998da9afcfba1073f1dbf6e76a8f89151a5817376f294df0bf257db6b82c49420220a13a82324232d4632b7163c5991211b02c60996d69ba
-
SSDEEP
24576:JMnea16HiW5Ean/KAgyFHre30v3TaS7QWin:JM9jWx/KmK3KTaSZE
Malware Config
Signatures
-
Use of msiexec (install) with remote resource 1 IoCs
pid Process 2564 MSIEXEC.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2564 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 2564 MSIEXEC.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2564 MSIEXEC.EXE 2564 MSIEXEC.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2564 1704 a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe 28 PID 1704 wrote to memory of 2564 1704 a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe 28 PID 1704 wrote to memory of 2564 1704 a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe 28 PID 1704 wrote to memory of 2564 1704 a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe 28 PID 1704 wrote to memory of 2564 1704 a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe 28 PID 1704 wrote to memory of 2564 1704 a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe 28 PID 1704 wrote to memory of 2564 1704 a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\MSIEXEC.EXEMSIEXEC.EXE /i "http://pliuht.cdnpckgs.eu/36175/cdn/silveroakcasino/Silver Oak Casino20130925051957.msi" DDC_DID=5233314 DDC_RTGURL=http://www.setupdlh.com/dl/TrackSetup/TrackSetup.aspx?DID=5233314 DDC_UPDATESTATUSURL=http://190.4.94.4:8080/silveroak/Lobby.WebServices/Installer.asmx SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe"2⤵
- Use of msiexec (install) with remote resource
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2564
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5da31bab6a073178acebc5d0fae83c5a5
SHA1ee26a2f715f24a6545341e9f86d63dc23e22833e
SHA256d41b1561b87345c64ab604ce185af557e71f80389032d23b57eed8edf80adcfd
SHA512082b7a81f1bcc1b0680e8ba757124e1002e21d7dcad195631afa608c5be2c1764a51266bedbfb50a009b3ef8f0ccabb7bbde82424dc0ecfed933ae99e0539a18
-
Filesize
21KB
MD5be345d0260ae12c5f2f337b17e07c217
SHA10976ba0982fe34f1c35a0974f6178e15c238ed7b
SHA256e994689a13b9448c074f9b471edeec9b524890a0d82925e98ab90b658016d8f3
SHA51277040dbee29be6b136a83b9e444d8b4f71ff739f7157e451778fb4fccb939a67ff881a70483de16bcb6ae1fea64a89e00711a33ec26f4d3eea8e16c9e9553eff
-
Filesize
20B
MD5db9af7503f195df96593ac42d5519075
SHA11b487531bad10f77750b8a50aca48593379e5f56
SHA2560a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13
SHA5126839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b
-
Filesize
5KB
MD5ffd71a434574b9477855b3fcd440530d
SHA195bbba76c5ac3b7be8a7a763e055c271fb9365f2
SHA256108aad68e0f007b448caad8ab0525ca4926060bb05eea4460c4af49afe624e95
SHA512e258456acfaacc28af14d93f7a9107e4dac9936030bd549ce25be66f26099226b6ba3c185bd2691463379ae5674e2f518fd14c169de857eac5bd1edd4a887d8d