Analysis
-
max time kernel
93s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 06:48
Static task
static1
Behavioral task
behavioral1
Sample
03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exe
-
Size
483KB
-
MD5
03c53d49e1ab788b6ef10ab30352e99a
-
SHA1
7c3bb07f638f564e4445f272ec370fe554b40898
-
SHA256
af33515824f66cae123b39cb59bf1364aa7690ba1e0ebdf51645358ebb2bf406
-
SHA512
1f47c43f140d32fec1ad7a92e6778bfb75ed973e0c71c6eaacaa5efeec592a9a0fecb4e439e77710849174e59113861be3c783f8d7f8cabe3c7e1a540de19e51
-
SSDEEP
6144:rmpiOwp9GHEaSeu439i3aLX0wPfvu1DmFH9omnnEXL/6AYYtPXY8G:apiOGRVl4NAaLX/fvuBwomnuieK
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2640-10-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-8-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-13-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-16-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-14-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-17-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-19-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-20-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-18-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-22-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-23-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-24-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-25-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-26-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-27-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-28-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-29-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-30-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-31-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-32-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-33-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-34-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-35-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2640-36-0x0000000000400000-0x00000000004B9000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exedescription pid process target process PID 2852 set thread context of 2640 2852 03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
vbc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2640 vbc.exe Token: SeSecurityPrivilege 2640 vbc.exe Token: SeTakeOwnershipPrivilege 2640 vbc.exe Token: SeLoadDriverPrivilege 2640 vbc.exe Token: SeSystemProfilePrivilege 2640 vbc.exe Token: SeSystemtimePrivilege 2640 vbc.exe Token: SeProfSingleProcessPrivilege 2640 vbc.exe Token: SeIncBasePriorityPrivilege 2640 vbc.exe Token: SeCreatePagefilePrivilege 2640 vbc.exe Token: SeBackupPrivilege 2640 vbc.exe Token: SeRestorePrivilege 2640 vbc.exe Token: SeShutdownPrivilege 2640 vbc.exe Token: SeDebugPrivilege 2640 vbc.exe Token: SeSystemEnvironmentPrivilege 2640 vbc.exe Token: SeChangeNotifyPrivilege 2640 vbc.exe Token: SeRemoteShutdownPrivilege 2640 vbc.exe Token: SeUndockPrivilege 2640 vbc.exe Token: SeManageVolumePrivilege 2640 vbc.exe Token: SeImpersonatePrivilege 2640 vbc.exe Token: SeCreateGlobalPrivilege 2640 vbc.exe Token: 33 2640 vbc.exe Token: 34 2640 vbc.exe Token: 35 2640 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 2624 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vbc.exepid process 2640 vbc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exedescription pid process target process PID 2852 wrote to memory of 2640 2852 03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exe vbc.exe PID 2852 wrote to memory of 2640 2852 03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exe vbc.exe PID 2852 wrote to memory of 2640 2852 03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exe vbc.exe PID 2852 wrote to memory of 2640 2852 03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exe vbc.exe PID 2852 wrote to memory of 2640 2852 03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exe vbc.exe PID 2852 wrote to memory of 2640 2852 03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exe vbc.exe PID 2852 wrote to memory of 2640 2852 03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exe vbc.exe PID 2852 wrote to memory of 2640 2852 03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03c53d49e1ab788b6ef10ab30352e99a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\thumbail4.pngFilesize
25KB
MD5cdba9ae7d72a67f1767ffa82f53238ac
SHA163810cba511dbd748a27e1d70b44689539249609
SHA25672cb26c7cef3ca8bd93c3ad0b8d6cca4dcac5966371742e49154df995e98c7c7
SHA512e7cd39d72c05d61763bafb22e004a6bbe1d8bbf603e5cc840fc78cdb176012fad73b7cae0358ab5ada1a4765d35749a98f3ba45e31011f2ae864b425b0c1d7b2
-
memory/2624-5-0x00000000000F0000-0x00000000000F2000-memory.dmpFilesize
8KB
-
memory/2640-18-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-28-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-35-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2640-10-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-8-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-6-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-13-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-34-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-16-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-14-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-17-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-19-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-20-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-33-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-36-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-32-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-23-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-24-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-25-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-26-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-27-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-22-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-29-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-30-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2640-31-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2852-2-0x00000000749E0000-0x0000000074F8B000-memory.dmpFilesize
5.7MB
-
memory/2852-4-0x00000000020D0000-0x00000000020D2000-memory.dmpFilesize
8KB
-
memory/2852-15-0x00000000749E0000-0x0000000074F8B000-memory.dmpFilesize
5.7MB
-
memory/2852-0-0x00000000749E1000-0x00000000749E2000-memory.dmpFilesize
4KB
-
memory/2852-1-0x00000000749E0000-0x0000000074F8B000-memory.dmpFilesize
5.7MB