Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe
-
Size
525KB
-
MD5
0518276518a7cbbe1612d562342ad8b4
-
SHA1
798768f8b57df56bc9829182f63af921d563e59a
-
SHA256
9c92a0abef8da9c24d5c52947f8b2f6344edfbf7efc512d649f4e01d46bababd
-
SHA512
ad125d3f6fc20956d53d3192c43c8d23bbf5e5797aadbb7de0e57dbf43e5a9273dd312aa3f26f7c841496aadbda2c502393e6e046a7fb2d2166ced854ed126bb
-
SSDEEP
12288:R2aM1ENS5YoY7KmjFlRO3K0znncqOSSVc0z27v:gJh5YR9I1cqOx27
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2992 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2516 Server1.exe -
Loads dropped DLL 2 IoCs
pid Process 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Server1.exe 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Server1.exe Server1.exe File created C:\Windows\SysWOW64\Server1.exe 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2516 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 28 PID 1660 wrote to memory of 2516 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 28 PID 1660 wrote to memory of 2516 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 28 PID 1660 wrote to memory of 2516 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 28 PID 1660 wrote to memory of 3020 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 29 PID 1660 wrote to memory of 3020 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 29 PID 1660 wrote to memory of 3020 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 29 PID 1660 wrote to memory of 3020 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 29 PID 1660 wrote to memory of 2992 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 31 PID 1660 wrote to memory of 2992 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 31 PID 1660 wrote to memory of 2992 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 31 PID 1660 wrote to memory of 2992 1660 0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2580 3020 cmd.exe 33 PID 3020 wrote to memory of 2580 3020 cmd.exe 33 PID 3020 wrote to memory of 2580 3020 cmd.exe 33 PID 3020 wrote to memory of 2580 3020 cmd.exe 33 PID 2580 wrote to memory of 2640 2580 net.exe 34 PID 2580 wrote to memory of 2640 2580 net.exe 34 PID 2580 wrote to memory of 2640 2580 net.exe 34 PID 2580 wrote to memory of 2640 2580 net.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0518276518a7cbbe1612d562342ad8b4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\Server1.exeC:\Windows\system32\Server1.exe -NetSata2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2516
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop sharedaccess2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵PID:2640
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_deleteme.bat2⤵
- Deletes itself
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5569f9a96109aa1fb09ae1d3543be8f2c
SHA1501f4c4e98f06d6da0ea5cbc087cc6f3db6dae81
SHA256169d67088ae5db2a4f8e0aa2d6c6bb52ec5a4a5ec04100d1ae14b66750ceeb4a
SHA512252b63fab3bbafe3df7cb79abbb784010fae6b55764c8026186d84eda9d195d0103c8ce29c43831c7f7661fa6b15599c6dd876a110855269200a407b8fa9d6df
-
Filesize
525KB
MD50518276518a7cbbe1612d562342ad8b4
SHA1798768f8b57df56bc9829182f63af921d563e59a
SHA2569c92a0abef8da9c24d5c52947f8b2f6344edfbf7efc512d649f4e01d46bababd
SHA512ad125d3f6fc20956d53d3192c43c8d23bbf5e5797aadbb7de0e57dbf43e5a9273dd312aa3f26f7c841496aadbda2c502393e6e046a7fb2d2166ced854ed126bb