Analysis
-
max time kernel
6s -
max time network
7s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 19:46
Behavioral task
behavioral1
Sample
0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Errors
General
-
Target
0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe
-
Size
57KB
-
MD5
0f4ccae69015afd983f4ab966f38b4f1
-
SHA1
16216ea7edb6972cf4189a1a5653b48bb916193e
-
SHA256
10f215af08b5714530bd8699db9882754f0aa0d136ed96e7d963de66e88e948b
-
SHA512
f0d972606844321b09c1ebf0e1ba5907b19d4b9c0f1279820173d86afefe8762498cb4892e91335ae9475ebbc56a8dfca93b1cc71dc0f23e4ab61204f4157f00
-
SSDEEP
1536:jqrOgsoj6m/yJrc01ty85ohFPDfKiDTTqHn2:Ieoj6m/y15WlDfzC
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2208-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2208-21-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\6AA669767177215dD47 = "C:\\Users\\Admin\\976717721\\976717721.EXE" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2540 shutdown.exe Token: SeRemoteShutdownPrivilege 2540 shutdown.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2252 2208 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2252 2208 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2252 2208 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2252 2208 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe 28 PID 2252 wrote to memory of 2540 2252 cmd.exe 30 PID 2252 wrote to memory of 2540 2252 cmd.exe 30 PID 2252 wrote to memory of 2540 2252 cmd.exe 30 PID 2252 wrote to memory of 2540 2252 cmd.exe 30 PID 2208 wrote to memory of 2584 2208 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe 31 PID 2208 wrote to memory of 2584 2208 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe 31 PID 2208 wrote to memory of 2584 2208 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe 31 PID 2208 wrote to memory of 2584 2208 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe 31 PID 2584 wrote to memory of 2524 2584 cmd.exe 33 PID 2584 wrote to memory of 2524 2584 cmd.exe 33 PID 2584 wrote to memory of 2524 2584 cmd.exe 33 PID 2584 wrote to memory of 2524 2584 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.execmd /c w.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\shutdown.exeshutdown /r /f /t 53⤵
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v 6AA669767177215dD47 /t REG_SZ /d "C:\Users\Admin\976717721\976717721.EXE" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v 6AA669767177215dD47 /t REG_SZ /d "C:\Users\Admin\976717721\976717721.EXE" /f3⤵
- Adds Run key to start application
PID:2524
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2700
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024B
MD588c77fce688fb7a8c639679b24fce7de
SHA11f3ff311fda98c303bb8b9940c17fca5179b83f0
SHA2560fee0b1c7f61354865168ad53c0c6d63e6355c4181bd00b401ace1dca23d39a1
SHA512346b9d131b5b8ef77c61192ef0f3d9dbc53126a1c6e83dd21d8726088e79a66396491afdf323d629ec60b4cdebd1a2bdd01dcac3cd8255b9c8a5f2bb21a23486