Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 07:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe
Resource
win7-20240508-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe
Resource
win10v2004-20240611-en
4 signatures
150 seconds
General
-
Target
151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe
-
Size
4KB
-
MD5
151bfc12370a456fb53559a5ed023300
-
SHA1
42341c77b106a984bc12b5b94e2c1e540bfcf6ca
-
SHA256
b3433bfa474d012c61927e7ed40972286953e60b80fffa7636b4229ca6866fa3
-
SHA512
65513a4d02a49b0563aa8c321b4ada4dcce5d2f6a3b4ac145a296e18b99e7c1b0fef53e1d4b0093663479c7ba4555a95dc7db9c4fec135fa961c4b92bb934045
-
SSDEEP
96:O/4z9ZzuPxslRxD9VsQHldgOkID5EDlyTUoyn:GEpZFRD+sTUoyn
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\360ray.exe," 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe -
Kills process with taskkill 4 IoCs
pid Process 1004 taskkill.exe 3984 taskkill.exe 2128 taskkill.exe 4072 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe Token: SeDebugPrivilege 4072 taskkill.exe Token: SeDebugPrivilege 1004 taskkill.exe Token: SeDebugPrivilege 2128 taskkill.exe Token: SeDebugPrivilege 3984 taskkill.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4808 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 83 PID 1596 wrote to memory of 4808 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 83 PID 1596 wrote to memory of 4808 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 83 PID 1596 wrote to memory of 4120 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 84 PID 1596 wrote to memory of 4120 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 84 PID 1596 wrote to memory of 4120 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 84 PID 1596 wrote to memory of 4364 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 85 PID 1596 wrote to memory of 4364 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 85 PID 1596 wrote to memory of 4364 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 85 PID 1596 wrote to memory of 1064 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 86 PID 1596 wrote to memory of 1064 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 86 PID 1596 wrote to memory of 1064 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 86 PID 1596 wrote to memory of 3048 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 87 PID 1596 wrote to memory of 3048 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 87 PID 1596 wrote to memory of 3048 1596 151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe 87 PID 4120 wrote to memory of 1004 4120 cmd.exe 92 PID 4120 wrote to memory of 1004 4120 cmd.exe 92 PID 4120 wrote to memory of 1004 4120 cmd.exe 92 PID 4364 wrote to memory of 3984 4364 cmd.exe 93 PID 4364 wrote to memory of 3984 4364 cmd.exe 93 PID 4364 wrote to memory of 3984 4364 cmd.exe 93 PID 1064 wrote to memory of 2128 1064 cmd.exe 94 PID 1064 wrote to memory of 2128 1064 cmd.exe 94 PID 1064 wrote to memory of 2128 1064 cmd.exe 94 PID 4808 wrote to memory of 4072 4808 cmd.exe 95 PID 4808 wrote to memory of 4072 4808 cmd.exe 95 PID 4808 wrote to memory of 4072 4808 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im rfwmain.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfwmain.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im rfwsrv.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfwsrv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im rfwstub.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfwstub.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im rfwproxy.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfwproxy.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\151BFC~1.EXE > nul2⤵PID:3048
-