Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
0e26b96fa6534c030f286dbc995e1832_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0e26b96fa6534c030f286dbc995e1832_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0e26b96fa6534c030f286dbc995e1832_JaffaCakes118.exe
-
Size
649KB
-
MD5
0e26b96fa6534c030f286dbc995e1832
-
SHA1
cf23316486e4ea5afc34d4b5bed3dc88c4d6d680
-
SHA256
97bf8c6b7f3cc3da5e7c8b60813aa20f0d7c1e51c8a2d16f23646c33260c2afb
-
SHA512
a1737ff50e46c5b1cb9459195b24e370416648128cc657c359757ba23be0cb1c8275660c38dad4584ec9c70e72e69ffcab9d59800339e525a3f5ebf754c43030
-
SSDEEP
12288:PvczV7Y5S0b9fFh2RRYAv2N59+kQDSpV3sjZajCN9unzaicTEkk:P0xDO9fuMAe+GpV3sFacDiKk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4784 Hacker.com.cn.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe 0e26b96fa6534c030f286dbc995e1832_JaffaCakes118.exe File opened for modification C:\Windows\Hacker.com.cn.exe 0e26b96fa6534c030f286dbc995e1832_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4108 0e26b96fa6534c030f286dbc995e1832_JaffaCakes118.exe Token: SeDebugPrivilege 4784 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4784 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4784 wrote to memory of 3192 4784 Hacker.com.cn.exe 84 PID 4784 wrote to memory of 3192 4784 Hacker.com.cn.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e26b96fa6534c030f286dbc995e1832_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e26b96fa6534c030f286dbc995e1832_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:3192
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649KB
MD50e26b96fa6534c030f286dbc995e1832
SHA1cf23316486e4ea5afc34d4b5bed3dc88c4d6d680
SHA25697bf8c6b7f3cc3da5e7c8b60813aa20f0d7c1e51c8a2d16f23646c33260c2afb
SHA512a1737ff50e46c5b1cb9459195b24e370416648128cc657c359757ba23be0cb1c8275660c38dad4584ec9c70e72e69ffcab9d59800339e525a3f5ebf754c43030