Analysis
-
max time kernel
140s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 00:46
Behavioral task
behavioral1
Sample
182af4ef590c2e92c3c26c5ff92d437b_JaffaCakes118.exe
Resource
win7-20240611-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
182af4ef590c2e92c3c26c5ff92d437b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
5 signatures
150 seconds
General
-
Target
182af4ef590c2e92c3c26c5ff92d437b_JaffaCakes118.exe
-
Size
16KB
-
MD5
182af4ef590c2e92c3c26c5ff92d437b
-
SHA1
b4fc284b6f14ade57344c098c8fafa78bf146983
-
SHA256
036f8643c52524035e4f2b15cd7a2085f6443ad1eec0f7d3577a68a75dd55429
-
SHA512
22d1d51530a6291a901d5f431b90e7952c7b1393b69e9d2de5f33e7d1e81ea6c66c50596c7aed22ee0084b65ba12de1d77efd3589845680bf10b9287864c6a94
-
SSDEEP
384:E5Jn19+mhrfCMsQ2dfAxQr6+e9Pfqbn14F:E551QsrfqfYxXha5m
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jiahus = " " 182af4ef590c2e92c3c26c5ff92d437b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jiahus = "c:\\windows\\system32\\svchqs.exe" 182af4ef590c2e92c3c26c5ff92d437b_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\svchqs.exe 182af4ef590c2e92c3c26c5ff92d437b_JaffaCakes118.exe File created \??\c:\windows\SysWOW64\svchqs.exe 182af4ef590c2e92c3c26c5ff92d437b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3812 182af4ef590c2e92c3c26c5ff92d437b_JaffaCakes118.exe 3812 182af4ef590c2e92c3c26c5ff92d437b_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3812 182af4ef590c2e92c3c26c5ff92d437b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3812 182af4ef590c2e92c3c26c5ff92d437b_JaffaCakes118.exe Token: SeDebugPrivilege 3812 182af4ef590c2e92c3c26c5ff92d437b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\182af4ef590c2e92c3c26c5ff92d437b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\182af4ef590c2e92c3c26c5ff92d437b_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3812