Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 14:38
Static task
static1
Behavioral task
behavioral1
Sample
aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe
-
Size
652KB
-
MD5
aee5704ab8e1ef4484caef048a2e286f
-
SHA1
e023f6678b315e5b48beeaa0f3239adc15aaf59f
-
SHA256
d07f8aa03c96baaacb17564a7bd9d8be6b7effb347a1a98e1ea201a528e4ff8f
-
SHA512
184645be06e5945d09c1c0bb0756e4943757d44db203928e025c6f5147c516123d9fc2221f1cd53e684edf170a39f7c3bfc58ba20a7824a21a77d21d03be36ef
-
SSDEEP
12288:2lAb5lthGT76dsIqVpYO+NyEcQQ+9OoZyXTGMFTBJPfiIR:2azrGT7muSiEc+9OoGG4pqI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1596 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1936 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe 860 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2744 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 1936 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\winstart = "\\defenderst\\winlogimde.exe" aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\winstart = "C:\\Users\\Admin\\AppData\\Roaming\\defenderst\\winlogimde.exe" aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1736 set thread context of 2744 1736 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 28 PID 1936 set thread context of 860 1936 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2140 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 860 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1736 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe Token: SeDebugPrivilege 2744 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe Token: SeDebugPrivilege 1936 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe Token: SeDebugPrivilege 860 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe Token: 33 860 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 860 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 860 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2744 1736 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 28 PID 1736 wrote to memory of 2744 1736 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 28 PID 1736 wrote to memory of 2744 1736 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 28 PID 1736 wrote to memory of 2744 1736 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 28 PID 1736 wrote to memory of 2744 1736 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 28 PID 1736 wrote to memory of 2744 1736 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 28 PID 1736 wrote to memory of 2744 1736 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 28 PID 1736 wrote to memory of 2744 1736 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 28 PID 1736 wrote to memory of 2744 1736 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 28 PID 2744 wrote to memory of 1936 2744 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 32 PID 2744 wrote to memory of 1936 2744 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 32 PID 2744 wrote to memory of 1936 2744 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 32 PID 2744 wrote to memory of 1936 2744 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 32 PID 2744 wrote to memory of 1596 2744 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 33 PID 2744 wrote to memory of 1596 2744 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 33 PID 2744 wrote to memory of 1596 2744 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 33 PID 2744 wrote to memory of 1596 2744 aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe 33 PID 1596 wrote to memory of 2140 1596 cmd.exe 35 PID 1596 wrote to memory of 2140 1596 cmd.exe 35 PID 1596 wrote to memory of 2140 1596 cmd.exe 35 PID 1596 wrote to memory of 2140 1596 cmd.exe 35 PID 1936 wrote to memory of 860 1936 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe 36 PID 1936 wrote to memory of 860 1936 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe 36 PID 1936 wrote to memory of 860 1936 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe 36 PID 1936 wrote to memory of 860 1936 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe 36 PID 1936 wrote to memory of 860 1936 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe 36 PID 1936 wrote to memory of 860 1936 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe 36 PID 1936 wrote to memory of 860 1936 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe 36 PID 1936 wrote to memory of 860 1936 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe 36 PID 1936 wrote to memory of 860 1936 aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\aee5704ab8e1ef4484caef048a2e286f_jaffacakes118\aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\aee5704ab8e1ef4484caef048a2e286f_jaffacakes118\aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\aee5704ab8e1ef4484caef048a2e286f_jaffacakes118\aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\aee5704ab8e1ef4484caef048a2e286f_jaffacakes118\aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:860
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\aee5704ab8e1ef4484caef048a2e286f_JaffaCakes118.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:2140
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\aee5704ab8e1ef4484caef048a2e286f_jaffacakes118\aee5704ab8e1ef4484caef048a2e286f_jaffacakes118.exe
Filesize652KB
MD5aee5704ab8e1ef4484caef048a2e286f
SHA1e023f6678b315e5b48beeaa0f3239adc15aaf59f
SHA256d07f8aa03c96baaacb17564a7bd9d8be6b7effb347a1a98e1ea201a528e4ff8f
SHA512184645be06e5945d09c1c0bb0756e4943757d44db203928e025c6f5147c516123d9fc2221f1cd53e684edf170a39f7c3bfc58ba20a7824a21a77d21d03be36ef
-
Filesize
56B
MD5c21ff3751aeec4506de0e2b2bec7cf66
SHA1f7ecfd2d361c287233d4480f4982d815cde28832
SHA256e7723b9bd121f5246641ae6736675c2f188e276c886e4cec6b405c92e10a5f36
SHA5121615e7d1e0a965c9a988a064e56e848211592d5ba5eceed513f586f704b7909da4dc6cb54a045fb456983796060058af13cf2bf2b23ba6e04884a14cef877af6