Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe
-
Size
226KB
-
MD5
0f96f7fb12ae00ba9cdcf74a8b44455b
-
SHA1
d6cd60de717b8e3bb280933a357ff8ddc9e367f2
-
SHA256
26203706cba58a2652434375528a145994353a918a80d90066e2071785c8a5ec
-
SHA512
a8eab1ad1433c79bf71465d15d4cdcd212ce00234afa3cc3469a13072ea95b3bac79f1560876875b1c72fb0d552dc78acd8103c3363348445e13c9d05aeb5df3
-
SSDEEP
3072:ta9pVd66uFW3P4a+qsv2lN+byKM3t6VP4oqB1ePKdU3DH89wBmo:ta9pVTbR+fv2l0brM6B/qB1ePKAvl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3056 system.exe -
Executes dropped EXE 2 IoCs
pid Process 3056 system.exe 2792 system.exe -
Loads dropped DLL 5 IoCs
pid Process 3056 system.exe 2792 system.exe 2792 system.exe 2792 system.exe 2792 system.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\bak8011252.log 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\WindowsUpdate\360safe.exe 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe File opened for modification C:\Program Files\WindowsUpdate\360safe.exe 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe File opened for modification C:\Program Files\WindowsUpdate\ControlPanel.cpl 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe File opened for modification C:\Program Files\Realtek\EditorsUI.dll 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3008 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe 3056 system.exe 3056 system.exe 2792 system.exe 3056 system.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeRestorePrivilege 3008 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3056 3008 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe 28 PID 3008 wrote to memory of 3056 3008 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe 28 PID 3008 wrote to memory of 3056 3008 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe 28 PID 3008 wrote to memory of 3056 3008 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe 28 PID 3008 wrote to memory of 2792 3008 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2792 3008 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2792 3008 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2792 3008 0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f96f7fb12ae00ba9cdcf74a8b44455b_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\system.exeC:\system.exe C:\PROGRA~1\WIFE7F~1\CONTRO~1.CPL comdl22⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\system.exeC:\system.exe C:\PROGRA~1\Realtek\EDITOR~1.DLL comdl22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Windows\System32\svchost.exeC:\Windows\\System32\\svchost.exe -k netsvcs1⤵PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30.2MB
MD51f987419a0af96a270d909887817bb85
SHA14f19ae0307387b6f2a2429647fabc0291f8491c4
SHA256f6a6561a2fd1c1a80758418b37fd7b05d7debc2cf718d0759ab401be4f554996
SHA51245fdb9ec48fa5fba3c51f6a66240feeb88b023faa77dc6d6a2a0b4159d03301e004f92ca739ed2681c59e6a1e3a00edd433f9120aab5a2cf294c77588d5fe823
-
Filesize
84B
MD5717073e0284d563827e8646ea002190b
SHA16d4d8d32778f44694291737fdd85c5d4fd413bf2
SHA256ffdd9d5d4a1f1b76fcb52590c10df3594fc4b703abe367f8361ad362e9ab51f3
SHA51224cbbf639551a6f90b5fd4f8539a4d480b71a51600411b1c8c39cd661a596e6269254d13b16221cb8db61ded20af419a287d9e15d3cdfa66e5099d1dd4c41ad2
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d