Analysis Overview
SHA256
16da066037834fe3cbd12a245d7e472058701686b2c8e8a071b641fed62654d4
Threat Level: Shows suspicious behavior
The file a22d248f967f87d8b08d1fde206e125b_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Use of msiexec (install) with remote resource
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-06-12 20:19
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-12 20:19
Reported
2024-06-12 20:22
Platform
win7-20240611-en
Max time kernel
122s
Max time network
128s
Command Line
Signatures
Use of msiexec (install) with remote resource
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\MSIEXEC.EXE | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | C:\Windows\SysWOW64\MSIEXEC.EXE | N/A |
| Token: SeIncreaseQuotaPrivilege | N/A | C:\Windows\SysWOW64\MSIEXEC.EXE | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\MSIEXEC.EXE | N/A |
| N/A | N/A | C:\Windows\SysWOW64\MSIEXEC.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe"
C:\Windows\SysWOW64\MSIEXEC.EXE
MSIEXEC.EXE /i "http://pliuht.cdnpckgs.eu/36175/cdn/silveroakcasino/Silver Oak Casino20130925051957.msi" DDC_DID=5233314 DDC_RTGURL=http://www.setupdlh.com/dl/TrackSetup/TrackSetup.aspx?DID=5233314 DDC_UPDATESTATUSURL=http://190.4.94.4:8080/silveroak/Lobby.WebServices/Installer.asmx SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | pliuht.cdnpckgs.eu | udp |
Files
C:\Users\Admin\AppData\Local\Temp\~7C24.tmp
| MD5 | ffd71a434574b9477855b3fcd440530d |
| SHA1 | 95bbba76c5ac3b7be8a7a763e055c271fb9365f2 |
| SHA256 | 108aad68e0f007b448caad8ab0525ca4926060bb05eea4460c4af49afe624e95 |
| SHA512 | e258456acfaacc28af14d93f7a9107e4dac9936030bd549ce25be66f26099226b6ba3c185bd2691463379ae5674e2f518fd14c169de857eac5bd1edd4a887d8d |
C:\Users\Admin\AppData\Local\Temp\_is7C46.tmp
| MD5 | da31bab6a073178acebc5d0fae83c5a5 |
| SHA1 | ee26a2f715f24a6545341e9f86d63dc23e22833e |
| SHA256 | d41b1561b87345c64ab604ce185af557e71f80389032d23b57eed8edf80adcfd |
| SHA512 | 082b7a81f1bcc1b0680e8ba757124e1002e21d7dcad195631afa608c5be2c1764a51266bedbfb50a009b3ef8f0ccabb7bbde82424dc0ecfed933ae99e0539a18 |
C:\Users\Admin\AppData\Local\Temp\{19996200-C732-4A17-91C2-2AE88F0AEDF5}\0x0409.ini
| MD5 | be345d0260ae12c5f2f337b17e07c217 |
| SHA1 | 0976ba0982fe34f1c35a0974f6178e15c238ed7b |
| SHA256 | e994689a13b9448c074f9b471edeec9b524890a0d82925e98ab90b658016d8f3 |
| SHA512 | 77040dbee29be6b136a83b9e444d8b4f71ff739f7157e451778fb4fccb939a67ff881a70483de16bcb6ae1fea64a89e00711a33ec26f4d3eea8e16c9e9553eff |
C:\Users\Admin\AppData\Local\Temp\{19996200-C732-4A17-91C2-2AE88F0AEDF5}\_ISMSIDEL.INI
| MD5 | db9af7503f195df96593ac42d5519075 |
| SHA1 | 1b487531bad10f77750b8a50aca48593379e5f56 |
| SHA256 | 0a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13 |
| SHA512 | 6839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-12 20:19
Reported
2024-06-12 20:22
Platform
win10v2004-20240508-en
Max time kernel
147s
Max time network
150s
Command Line
Signatures
Use of msiexec (install) with remote resource
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\MSIEXEC.EXE | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | C:\Windows\SysWOW64\MSIEXEC.EXE | N/A |
| Token: SeIncreaseQuotaPrivilege | N/A | C:\Windows\SysWOW64\MSIEXEC.EXE | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\MSIEXEC.EXE | N/A |
| N/A | N/A | C:\Windows\SysWOW64\MSIEXEC.EXE | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3288 wrote to memory of 3728 | N/A | C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe | C:\Windows\SysWOW64\MSIEXEC.EXE |
| PID 3288 wrote to memory of 3728 | N/A | C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe | C:\Windows\SysWOW64\MSIEXEC.EXE |
| PID 3288 wrote to memory of 3728 | N/A | C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe | C:\Windows\SysWOW64\MSIEXEC.EXE |
Processes
C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe"
C:\Windows\SysWOW64\MSIEXEC.EXE
MSIEXEC.EXE /i "http://pliuht.cdnpckgs.eu/36175/cdn/silveroakcasino/Silver Oak Casino20130925051957.msi" DDC_DID=5233314 DDC_RTGURL=http://www.setupdlh.com/dl/TrackSetup/TrackSetup.aspx?DID=5233314 DDC_UPDATESTATUSURL=http://190.4.94.4:8080/silveroak/Lobby.WebServices/Installer.asmx SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | pliuht.cdnpckgs.eu | udp |
Files
C:\Users\Admin\AppData\Local\Temp\~5EBC.tmp
| MD5 | ffd71a434574b9477855b3fcd440530d |
| SHA1 | 95bbba76c5ac3b7be8a7a763e055c271fb9365f2 |
| SHA256 | 108aad68e0f007b448caad8ab0525ca4926060bb05eea4460c4af49afe624e95 |
| SHA512 | e258456acfaacc28af14d93f7a9107e4dac9936030bd549ce25be66f26099226b6ba3c185bd2691463379ae5674e2f518fd14c169de857eac5bd1edd4a887d8d |
C:\Users\Admin\AppData\Local\Temp\_is5EBF.tmp
| MD5 | da31bab6a073178acebc5d0fae83c5a5 |
| SHA1 | ee26a2f715f24a6545341e9f86d63dc23e22833e |
| SHA256 | d41b1561b87345c64ab604ce185af557e71f80389032d23b57eed8edf80adcfd |
| SHA512 | 082b7a81f1bcc1b0680e8ba757124e1002e21d7dcad195631afa608c5be2c1764a51266bedbfb50a009b3ef8f0ccabb7bbde82424dc0ecfed933ae99e0539a18 |
C:\Users\Admin\AppData\Local\Temp\{3D111050-F3F5-4865-9631-22B7FA6DF946}\0x0409.ini
| MD5 | be345d0260ae12c5f2f337b17e07c217 |
| SHA1 | 0976ba0982fe34f1c35a0974f6178e15c238ed7b |
| SHA256 | e994689a13b9448c074f9b471edeec9b524890a0d82925e98ab90b658016d8f3 |
| SHA512 | 77040dbee29be6b136a83b9e444d8b4f71ff739f7157e451778fb4fccb939a67ff881a70483de16bcb6ae1fea64a89e00711a33ec26f4d3eea8e16c9e9553eff |
C:\Users\Admin\AppData\Local\Temp\{3D111050-F3F5-4865-9631-22B7FA6DF946}\_ISMSIDEL.INI
| MD5 | db9af7503f195df96593ac42d5519075 |
| SHA1 | 1b487531bad10f77750b8a50aca48593379e5f56 |
| SHA256 | 0a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13 |
| SHA512 | 6839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b |