Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 14:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0e7ad4b3ca3ed22d4e768f28cd01f4f2_JaffaCakes118.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0e7ad4b3ca3ed22d4e768f28cd01f4f2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
5 signatures
150 seconds
General
-
Target
0e7ad4b3ca3ed22d4e768f28cd01f4f2_JaffaCakes118.exe
-
Size
56KB
-
MD5
0e7ad4b3ca3ed22d4e768f28cd01f4f2
-
SHA1
f1a5776e586f07c10dff06b2a135e4e1b994580c
-
SHA256
c783bc6d8800bf9c70e930af8f6f81171c1881a49602136667c0f4df8899ff56
-
SHA512
b8f551a4f847567d9c96f577636b46a521d04bea6903ceaf86f256c7cb39f385b0c7aa91b5ceea87ce917e94c88fe4fc62fc137c68affcd5a40bb0b65eeda499
-
SSDEEP
768:bN8I6utFCRoUjaLiv1fy91af05nM9EmvpRyHd6vFqf49:bN8I6utFCRoIfyra8u9hvp2d6vFa6
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Explorer = "C:\\Program Files\\Explorer\\server.exe" 0e7ad4b3ca3ed22d4e768f28cd01f4f2_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Explorer\ 0e7ad4b3ca3ed22d4e768f28cd01f4f2_JaffaCakes118.exe File opened for modification C:\Program Files\Explorer\server.exe 0e7ad4b3ca3ed22d4e768f28cd01f4f2_JaffaCakes118.exe File opened for modification C:\Program Files\Explorer\keys.txt 0e7ad4b3ca3ed22d4e768f28cd01f4f2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2320 0e7ad4b3ca3ed22d4e768f28cd01f4f2_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2320 0e7ad4b3ca3ed22d4e768f28cd01f4f2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2320 0e7ad4b3ca3ed22d4e768f28cd01f4f2_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7ad4b3ca3ed22d4e768f28cd01f4f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e7ad4b3ca3ed22d4e768f28cd01f4f2_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2320