Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 04:50
Static task
static1
Behavioral task
behavioral1
Sample
02f0bf4a43452db69f30e90964db0f99_JaffaCakes118.jar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
02f0bf4a43452db69f30e90964db0f99_JaffaCakes118.jar
Resource
win10v2004-20240611-en
General
-
Target
02f0bf4a43452db69f30e90964db0f99_JaffaCakes118.jar
-
Size
3KB
-
MD5
02f0bf4a43452db69f30e90964db0f99
-
SHA1
dde26a18dc35ecd8a5a55173195d83818fb07207
-
SHA256
977f122fede43d6424eebcf0531ef13163604b76799853df9690baf23d723423
-
SHA512
26529e7757eb5c31c9bdc01c0dc4e847d16ed3077d4fe4fcab302e5b7fcb2b5b5a7081094c6133311eb68d3f67e6b3f9b5a96b02132f9c5acf91449b2834de3f
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2516 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 228 wrote to memory of 2516 228 java.exe 85 PID 228 wrote to memory of 2516 228 java.exe 85
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\02f0bf4a43452db69f30e90964db0f99_JaffaCakes118.jar1⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD53fcdced4213595da7d34a0b556f83cc9
SHA17a5446f0b02b4eda458cdfa133ee384ceefc9e19
SHA2560a549e2c1c0803117fbf188f6ea534f133e85dc3bec2b3fc30b1c563e8fdf799
SHA5121bdf06d24442cff3faabb88615b44ed9fc9528ea14d67a58dbe10272ef56a0c5e800714dc21e9dcf6af0a13d24926ba20b1de502e03171257fbe31f23921ac42