Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
aa35e4b57c1cffa400252d7c0ed86489_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
aa35e4b57c1cffa400252d7c0ed86489_JaffaCakes118.exe
-
Size
96KB
-
MD5
aa35e4b57c1cffa400252d7c0ed86489
-
SHA1
66ff11b0799df69bf02711518197d89f5b09f5c4
-
SHA256
d989d682abae81162d7fe9ee3e9360fc3e4d2c8cb02eff69c385e0d7c3a26b95
-
SHA512
1127fd5019cd94f7e15a6109fa274539b64ad676ee12897fa7252ff1f96ae92c9493fa855e94a90685d4be7d2afd5d675e9e882e7879f57a4b80052ac7215c17
-
SSDEEP
1536:iKY6w0gUYfy8INUt5RonVKwjZ4mJzrVnrmrPfIqBVz/fTT:k0gfy8OUZondp10Iqvz/fTT
Malware Config
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Deletes itself 1 IoCs
pid Process 552 explorer.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2732 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2936 aa35e4b57c1cffa400252d7c0ed86489_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2936 aa35e4b57c1cffa400252d7c0ed86489_JaffaCakes118.exe 552 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2092 vssvc.exe Token: SeRestorePrivilege 2092 vssvc.exe Token: SeAuditPrivilege 2092 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2936 wrote to memory of 552 2936 aa35e4b57c1cffa400252d7c0ed86489_JaffaCakes118.exe 28 PID 2936 wrote to memory of 552 2936 aa35e4b57c1cffa400252d7c0ed86489_JaffaCakes118.exe 28 PID 2936 wrote to memory of 552 2936 aa35e4b57c1cffa400252d7c0ed86489_JaffaCakes118.exe 28 PID 2936 wrote to memory of 552 2936 aa35e4b57c1cffa400252d7c0ed86489_JaffaCakes118.exe 28 PID 552 wrote to memory of 2336 552 explorer.exe 29 PID 552 wrote to memory of 2336 552 explorer.exe 29 PID 552 wrote to memory of 2336 552 explorer.exe 29 PID 552 wrote to memory of 2336 552 explorer.exe 29 PID 552 wrote to memory of 2356 552 explorer.exe 30 PID 552 wrote to memory of 2356 552 explorer.exe 30 PID 552 wrote to memory of 2356 552 explorer.exe 30 PID 552 wrote to memory of 2356 552 explorer.exe 30 PID 2356 wrote to memory of 2732 2356 svchost.exe 31 PID 2356 wrote to memory of 2732 2356 svchost.exe 31 PID 2356 wrote to memory of 2732 2356 svchost.exe 31 PID 2356 wrote to memory of 2732 2356 svchost.exe 31 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa35e4b57c1cffa400252d7c0ed86489_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aa35e4b57c1cffa400252d7c0ed86489_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Deletes itself
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" %13⤵PID:2336
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2732
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2092