Analysis
-
max time kernel
133s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
16182880634e9289af007508dfd85740_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
16182880634e9289af007508dfd85740_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
16182880634e9289af007508dfd85740_JaffaCakes118.exe
-
Size
155KB
-
MD5
16182880634e9289af007508dfd85740
-
SHA1
dc71b2c133802dee2221d48b8a63e23533d37017
-
SHA256
7d38ad8da0478c19153ec737aa72ff7a6a27e00355c4ea220a5f386484e6d3b8
-
SHA512
54e888ea70af5ef8a9306011a8a3a7fe21f3cfe69c06b8344c2588526feeb825a9f3833536986f8a17cc84c3ba9a084e89ad67cab00fc08f64a7c47619a4a08d
-
SSDEEP
3072:ZQZ90x4MNh/oqG5O7Lo+GlxLJqDdtHxk+KC:ZQZ9lMjAqGcxGfKzxkU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2300 16182880634e9289af007508dfd85740_JaffaCakes118.TMP0.EXE -
Loads dropped DLL 1 IoCs
pid Process 648 16182880634e9289af007508dfd85740_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 648 set thread context of 2300 648 16182880634e9289af007508dfd85740_JaffaCakes118.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 2220 2300 WerFault.exe 83 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 648 16182880634e9289af007508dfd85740_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 648 wrote to memory of 2300 648 16182880634e9289af007508dfd85740_JaffaCakes118.exe 83 PID 648 wrote to memory of 2300 648 16182880634e9289af007508dfd85740_JaffaCakes118.exe 83 PID 648 wrote to memory of 2300 648 16182880634e9289af007508dfd85740_JaffaCakes118.exe 83 PID 648 wrote to memory of 2300 648 16182880634e9289af007508dfd85740_JaffaCakes118.exe 83 PID 648 wrote to memory of 2300 648 16182880634e9289af007508dfd85740_JaffaCakes118.exe 83 PID 648 wrote to memory of 2300 648 16182880634e9289af007508dfd85740_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\16182880634e9289af007508dfd85740_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16182880634e9289af007508dfd85740_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\16182880634e9289af007508dfd85740_JaffaCakes118.TMP0.EXE"C:\Users\Admin\AppData\Local\Temp\16182880634e9289af007508dfd85740_JaffaCakes118.exe"2⤵
- Executes dropped EXE
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 2523⤵
- Program crash
PID:2220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2300 -ip 23001⤵PID:1160
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD554bac76b2ba7144684efdd116237934d
SHA1a722e47af841fea7f16c3b9613028aa37317f7b1
SHA256dfdbbbaed73bead58b0c3eeb6a2947c1b66c7013d87b99b1b0bda964d61c6faa
SHA512c5f145519dd451faf9478523d8cc9e94907673684fe1df8444e3295ed5dcc185594d6030f2ad3d17281035a4f0a9826afa068e70bd5a0bc4eadb21f403dc8182
-
Filesize
104KB
MD559d397b82b8c065871a35cc869730e46
SHA130d67887eceb670d81d76f1c94d49cf9d996ae9d
SHA25660c81fdb44869ea2d8b92ce62b43fa7c3c6863989b11862ddbdd0dd0d0adf509
SHA512bfa3e3b793457e6330e5c5af90b3ef6b07f6ec044c12e7048117cdf884129f2b2c479f5e1abae2ea3209a5ce7a2195ae6327334bb6ba2cc84b146e0cc2f15763