Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
15b08d5b27246906f30a96005933afde_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
15b08d5b27246906f30a96005933afde_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
15b08d5b27246906f30a96005933afde_JaffaCakes118.exe
-
Size
7.6MB
-
MD5
15b08d5b27246906f30a96005933afde
-
SHA1
0d48ef48ac98ea6f5bf658efeaacc140fb3ae34e
-
SHA256
ef76ed7624f7d3322113b03c68c5a4962e51a94106c0fc92a60b3307be63b0ed
-
SHA512
19198edceefd2f9e8cc84d26e845618dc4d15bd27959771efe983eaedcf4e9ca86feba8b0b30b7fd166b601897f08eb3b3893f2fe9fb103650a60769899aa753
-
SSDEEP
196608:UX6NJCAdDgClPrzuJ6Dx0jyiNgifBtUnIhuTbyYDJfqFtev:UKLCAtgClzKIuae361TbyYtqFt2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3916 servbrow.exe 1768 servbrow.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\servbrow.exe 15b08d5b27246906f30a96005933afde_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTcbPrivilege 3916 servbrow.exe Token: SeChangeNotifyPrivilege 3916 servbrow.exe Token: SeIncreaseQuotaPrivilege 3916 servbrow.exe Token: SeAssignPrimaryTokenPrivilege 3916 servbrow.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4348 15b08d5b27246906f30a96005933afde_JaffaCakes118.exe 3916 servbrow.exe 1768 servbrow.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3916 wrote to memory of 1768 3916 servbrow.exe 106 PID 3916 wrote to memory of 1768 3916 servbrow.exe 106 PID 3916 wrote to memory of 1768 3916 servbrow.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\15b08d5b27246906f30a96005933afde_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15b08d5b27246906f30a96005933afde_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4348
-
C:\Windows\servbrow.exe"C:\Windows\servbrow.exe" /Service1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\servbrow.exe"C:\Windows\servbrow.exe" /Popup2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4172,i,8447163055677043976,7218082390179600880,262144 --variations-seed-version --mojo-platform-channel-handle=4584 /prefetch:81⤵PID:1624
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.6MB
MD5ac32bbf506c03245e0c957c1e09b6f3f
SHA1293593683f23f441058922b9401b6b2c8e158258
SHA256c142317322a587dff1877be32a4cc7b366cf0f4651d8ae946c8529d15082a7ac
SHA51267e847203f794ecfb29b5fc52c11a668547d1c9f2c0a2021da57c1f1bdd757e962fab515a073f4f1d20102c4e78735ff8fee0144f2e9fdfb9fadd724f1a188c3