Analysis
-
max time kernel
141s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe
-
Size
458KB
-
MD5
076e92a51ed399ba6da364a546bfab4c
-
SHA1
6001ed4a3bbf595ed7fca7ef474b623992d01088
-
SHA256
725deb1097ce51b0051423a7744f5c9c9725d735922b9163df3820938ab711d8
-
SHA512
ac7cc34e3d1ac95609916d589c16bac66e2bc745c8973f96899299a32579cf3f0045867102adb50035beacfff2f038ce77388c836ea9cf795875001e92771123
-
SSDEEP
12288:lfCS4fa6d/iG+21/9ay8DPuWMl6HZtvm3:ZlTL2ey8DGp++3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2504 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2208 Hacker.com.cn.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe 076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe File opened for modification C:\Windows\Hacker.com.cn.exe 076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe File created C:\Windows\uninstal.bat 076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2204 076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe Token: SeDebugPrivilege 2208 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1432 2208 Hacker.com.cn.exe 29 PID 2208 wrote to memory of 1432 2208 Hacker.com.cn.exe 29 PID 2208 wrote to memory of 1432 2208 Hacker.com.cn.exe 29 PID 2208 wrote to memory of 1432 2208 Hacker.com.cn.exe 29 PID 2204 wrote to memory of 2504 2204 076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2504 2204 076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2504 2204 076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2504 2204 076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2504 2204 076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2504 2204 076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2504 2204 076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
PID:2504
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1432
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD5076e92a51ed399ba6da364a546bfab4c
SHA16001ed4a3bbf595ed7fca7ef474b623992d01088
SHA256725deb1097ce51b0051423a7744f5c9c9725d735922b9163df3820938ab711d8
SHA512ac7cc34e3d1ac95609916d589c16bac66e2bc745c8973f96899299a32579cf3f0045867102adb50035beacfff2f038ce77388c836ea9cf795875001e92771123
-
Filesize
218B
MD5978c68f23758d0bc391f0fdf3a1581a0
SHA1ac7bac3770e8d16cbd01052191a8ac17a67ba34c
SHA256a54c0886430036dfa4c3386dc07c994da33c24d4413b26200569fa2d42cadb6c
SHA5123f645f81cc8245f6f930df9cc31f23c838c0a58950a383aa2e2733c88004092fa5f2e2ed3175df067e4cd66280657666a54a532f078211d4b6cdc69bed6a785c