Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe
-
Size
414KB
-
MD5
084662ef21668e6d11e4ab2b59471f11
-
SHA1
cac7d6e7c557fda441e1573dcb5634d218854746
-
SHA256
ec08f4f4c345b690e228cc7f93f3488cfd5d62906c90c7d0d887d942c253ed29
-
SHA512
417bb394132c3dc3b90b1b51682ea9d31f484e446eb1333e5fb8e7777558cfc1675ee0712c954daa668d80549f7666ebfdb60cb6d98b7cf1bc20c33392cb2880
-
SSDEEP
6144:iARb+1YFc8CnFu73mBCR7NFrkcrreoSi7CL+PqL55NjeqE5:9b+1F8C+minkSrfSi+L/V5Nj
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\ProgramData\\oB19701HcHaM19701\\oB19701HcHaM19701.exe" 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1516 oB19701HcHaM19701.exe -
Executes dropped EXE 1 IoCs
pid Process 1516 oB19701HcHaM19701.exe -
Loads dropped DLL 2 IoCs
pid Process 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2416-1-0x0000000000400000-0x00000000004D2000-memory.dmp upx behavioral1/memory/2416-10-0x0000000000400000-0x00000000004D2000-memory.dmp upx behavioral1/memory/2416-31-0x0000000000400000-0x00000000004D2000-memory.dmp upx behavioral1/memory/1516-33-0x0000000000400000-0x00000000004D2000-memory.dmp upx behavioral1/memory/1516-40-0x0000000000400000-0x00000000004D2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\oB19701HcHaM19701 = "C:\\ProgramData\\oB19701HcHaM19701\\oB19701HcHaM19701.exe" oB19701HcHaM19701.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe Token: SeDebugPrivilege 1516 oB19701HcHaM19701.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1516 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 32 PID 2416 wrote to memory of 1516 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 32 PID 2416 wrote to memory of 1516 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 32 PID 2416 wrote to memory of 1516 2416 084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\ProgramData\oB19701HcHaM19701\oB19701HcHaM19701.exe"C:\ProgramData\oB19701HcHaM19701\oB19701HcHaM19701.exe" "C:\Users\Admin\AppData\Local\Temp\084662ef21668e6d11e4ab2b59471f11_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208B
MD5e37ec29fa99b48a3a200a1619e86da0f
SHA1fa8e1138cc3794805fd0fdca5c18ea3bc5448199
SHA256914a557885c341eec3addd4e0e2402e04b785e6fbecd7fc616bd5b52ef3f1a4a
SHA51255a75b0f8283ab7b8fbb903dd74cbe84cc8ab76fdc9c445f3c7607a226890585a806f186b289526f73ea612dc262626eac2b904e3b91be822da030da1b7398b3
-
Filesize
414KB
MD5548d6e5d6a580e3e2dbada33298094ea
SHA1707bad2d7c6bbe884fb58a24203d1977595ef995
SHA2563e8814a8b9100ea039e36ede6152ebc6c073a91541364ed1ec7bcfaa237941c1
SHA512905a17b9341ccd0a4a56e045a202c8c3bb05fd4880d52685a59bddc85a48e546b835e8649d6254a13131ca0372061396f8f25e2dbdc9eec020e6e180e9251ed5