Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
0e5a40d7feb71b68d499d3be2bc204a1_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0e5a40d7feb71b68d499d3be2bc204a1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0e5a40d7feb71b68d499d3be2bc204a1_JaffaCakes118.exe
-
Size
549KB
-
MD5
0e5a40d7feb71b68d499d3be2bc204a1
-
SHA1
19a02198e492e0191d53876e42e52f0f3551455f
-
SHA256
b26b12f6902edc120d809df1e256c18f2c0fc231ea56929c462c27ca4beb6bf9
-
SHA512
e33d643081c18978dc51e0cf172e15c9aa8ee48b31cd42184c9580f40162019a5b982f72de957713817ce08bfe1de4bdec477b95002bb631ea0ccc5663fc0fa0
-
SSDEEP
12288:asTGcl+ha56ebBtmR1qY+1ZELraAH/HiK6:ahM6Qtqqh0H0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2276 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2484 Hacker.com.cn.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\guocok88.BAT 0e5a40d7feb71b68d499d3be2bc204a1_JaffaCakes118.exe File created C:\Windows\Hacker.com.cn.exe 0e5a40d7feb71b68d499d3be2bc204a1_JaffaCakes118.exe File opened for modification C:\Windows\Hacker.com.cn.exe 0e5a40d7feb71b68d499d3be2bc204a1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1968 0e5a40d7feb71b68d499d3be2bc204a1_JaffaCakes118.exe Token: SeDebugPrivilege 2484 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2928 2484 Hacker.com.cn.exe 29 PID 2484 wrote to memory of 2928 2484 Hacker.com.cn.exe 29 PID 2484 wrote to memory of 2928 2484 Hacker.com.cn.exe 29 PID 2484 wrote to memory of 2928 2484 Hacker.com.cn.exe 29 PID 1968 wrote to memory of 2276 1968 0e5a40d7feb71b68d499d3be2bc204a1_JaffaCakes118.exe 30 PID 1968 wrote to memory of 2276 1968 0e5a40d7feb71b68d499d3be2bc204a1_JaffaCakes118.exe 30 PID 1968 wrote to memory of 2276 1968 0e5a40d7feb71b68d499d3be2bc204a1_JaffaCakes118.exe 30 PID 1968 wrote to memory of 2276 1968 0e5a40d7feb71b68d499d3be2bc204a1_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e5a40d7feb71b68d499d3be2bc204a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e5a40d7feb71b68d499d3be2bc204a1_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\guocok88.BAT2⤵
- Deletes itself
PID:2276
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2928
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD50e5a40d7feb71b68d499d3be2bc204a1
SHA119a02198e492e0191d53876e42e52f0f3551455f
SHA256b26b12f6902edc120d809df1e256c18f2c0fc231ea56929c462c27ca4beb6bf9
SHA512e33d643081c18978dc51e0cf172e15c9aa8ee48b31cd42184c9580f40162019a5b982f72de957713817ce08bfe1de4bdec477b95002bb631ea0ccc5663fc0fa0
-
Filesize
218B
MD59611e4a65b8bfff80b1fb9c2d4829932
SHA1abbc56de68dfa78d861487ab86d8f5c8e1ea591a
SHA25625107efdeca5ee8cc1e96c0f9e1679a4502fc08643727f5840356626f5c9a0a5
SHA51244aead1c266853d16e2d941b624242960f68f48c448c14efb4e7dbee45dde59bdd53b34ca455b8572997a659ce2344c247efaa0ca452a7a463109f5def982b89