Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
183f0ac56267fcfa87570e3533b17dcb_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
183f0ac56267fcfa87570e3533b17dcb_JaffaCakes118.exe
-
Size
4.2MB
-
MD5
183f0ac56267fcfa87570e3533b17dcb
-
SHA1
0bcb4f0d472ed346ea41f652bc89f770b78d97a2
-
SHA256
e055c80c80b7462e02dc357dfb0c336f60987611d24f29dc867d8788ca9eff6b
-
SHA512
dda8c4a0c3869112085c7d9de249e0de2978e7e3a6bd11e798ece22fd3ea233f72f028b93ca08facd100966fed56092eecafd019ce66859f9e54857e2832111b
-
SSDEEP
98304:3jJ1gKpqp+z0DKOyZhjt4UpQohV6oby9pr1adb8l:91Rp02Oy7e9oSkSmA
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \??\c:\vp8encoder.dll acprotect \??\c:\vp8decoder.dll acprotect -
Processes:
resource yara_rule \??\c:\rutserv.exe aspack_v212_v242 \??\c:\rfusclient.exe aspack_v212_v242 -
Executes dropped EXE 11 IoCs
Processes:
admi.exerutserv.exerutserv.exerutserv.exerutserv.exerutserv.exerutserv.exerutserv.exerfusclient.exerfusclient.exerfusclient.exepid process 2560 admi.exe 1820 rutserv.exe 500 rutserv.exe 1608 rutserv.exe 1264 rutserv.exe 1528 rutserv.exe 2284 rutserv.exe 2860 rutserv.exe 324 rfusclient.exe 1828 rfusclient.exe 1540 rfusclient.exe -
Processes:
resource yara_rule \??\c:\vp8encoder.dll upx \??\c:\vp8decoder.dll upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 2024 timeout.exe 1672 timeout.exe -
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2456 taskkill.exe 2500 taskkill.exe 2788 taskkill.exe 2556 taskkill.exe -
Runs .reg file with regedit 2 IoCs
Processes:
regedit.exeregedit.exepid process 1676 regedit.exe 2496 regedit.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
rutserv.exerutserv.exerutserv.exerutserv.exerutserv.exerfusclient.exerutserv.exepid process 500 rutserv.exe 500 rutserv.exe 500 rutserv.exe 500 rutserv.exe 1608 rutserv.exe 1608 rutserv.exe 1264 rutserv.exe 1264 rutserv.exe 1528 rutserv.exe 1528 rutserv.exe 2284 rutserv.exe 2284 rutserv.exe 2284 rutserv.exe 2284 rutserv.exe 324 rfusclient.exe 2860 rutserv.exe 2860 rutserv.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
rfusclient.exepid process 1540 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exerutserv.exerutserv.exerutserv.exerutserv.exedescription pid process Token: SeDebugPrivilege 2456 taskkill.exe Token: SeDebugPrivilege 2500 taskkill.exe Token: SeDebugPrivilege 2788 taskkill.exe Token: SeDebugPrivilege 2556 taskkill.exe Token: SeDebugPrivilege 500 rutserv.exe Token: SeDebugPrivilege 1264 rutserv.exe Token: SeTakeOwnershipPrivilege 2284 rutserv.exe Token: SeTcbPrivilege 2284 rutserv.exe Token: SeTcbPrivilege 2284 rutserv.exe Token: SeDebugPrivilege 2860 rutserv.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
rutserv.exerutserv.exerutserv.exerutserv.exerutserv.exerutserv.exepid process 500 rutserv.exe 1608 rutserv.exe 1264 rutserv.exe 1528 rutserv.exe 2284 rutserv.exe 2860 rutserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
183f0ac56267fcfa87570e3533b17dcb_JaffaCakes118.execmd.exeadmi.execmd.exeWScript.execmd.exedescription pid process target process PID 2360 wrote to memory of 2104 2360 183f0ac56267fcfa87570e3533b17dcb_JaffaCakes118.exe cmd.exe PID 2360 wrote to memory of 2104 2360 183f0ac56267fcfa87570e3533b17dcb_JaffaCakes118.exe cmd.exe PID 2360 wrote to memory of 2104 2360 183f0ac56267fcfa87570e3533b17dcb_JaffaCakes118.exe cmd.exe PID 2360 wrote to memory of 2104 2360 183f0ac56267fcfa87570e3533b17dcb_JaffaCakes118.exe cmd.exe PID 2360 wrote to memory of 2104 2360 183f0ac56267fcfa87570e3533b17dcb_JaffaCakes118.exe cmd.exe PID 2360 wrote to memory of 2104 2360 183f0ac56267fcfa87570e3533b17dcb_JaffaCakes118.exe cmd.exe PID 2360 wrote to memory of 2104 2360 183f0ac56267fcfa87570e3533b17dcb_JaffaCakes118.exe cmd.exe PID 2104 wrote to memory of 2560 2104 cmd.exe admi.exe PID 2104 wrote to memory of 2560 2104 cmd.exe admi.exe PID 2104 wrote to memory of 2560 2104 cmd.exe admi.exe PID 2104 wrote to memory of 2560 2104 cmd.exe admi.exe PID 2104 wrote to memory of 2560 2104 cmd.exe admi.exe PID 2104 wrote to memory of 2560 2104 cmd.exe admi.exe PID 2104 wrote to memory of 2560 2104 cmd.exe admi.exe PID 2560 wrote to memory of 2464 2560 admi.exe WScript.exe PID 2560 wrote to memory of 2464 2560 admi.exe WScript.exe PID 2560 wrote to memory of 2464 2560 admi.exe WScript.exe PID 2560 wrote to memory of 2464 2560 admi.exe WScript.exe PID 2560 wrote to memory of 2464 2560 admi.exe WScript.exe PID 2560 wrote to memory of 2464 2560 admi.exe WScript.exe PID 2560 wrote to memory of 2464 2560 admi.exe WScript.exe PID 2560 wrote to memory of 2492 2560 admi.exe cmd.exe PID 2560 wrote to memory of 2492 2560 admi.exe cmd.exe PID 2560 wrote to memory of 2492 2560 admi.exe cmd.exe PID 2560 wrote to memory of 2492 2560 admi.exe cmd.exe PID 2560 wrote to memory of 2492 2560 admi.exe cmd.exe PID 2560 wrote to memory of 2492 2560 admi.exe cmd.exe PID 2560 wrote to memory of 2492 2560 admi.exe cmd.exe PID 2492 wrote to memory of 2456 2492 cmd.exe taskkill.exe PID 2492 wrote to memory of 2456 2492 cmd.exe taskkill.exe PID 2492 wrote to memory of 2456 2492 cmd.exe taskkill.exe PID 2492 wrote to memory of 2456 2492 cmd.exe taskkill.exe PID 2492 wrote to memory of 2456 2492 cmd.exe taskkill.exe PID 2492 wrote to memory of 2456 2492 cmd.exe taskkill.exe PID 2492 wrote to memory of 2456 2492 cmd.exe taskkill.exe PID 2464 wrote to memory of 2724 2464 WScript.exe cmd.exe PID 2464 wrote to memory of 2724 2464 WScript.exe cmd.exe PID 2464 wrote to memory of 2724 2464 WScript.exe cmd.exe PID 2464 wrote to memory of 2724 2464 WScript.exe cmd.exe PID 2464 wrote to memory of 2724 2464 WScript.exe cmd.exe PID 2464 wrote to memory of 2724 2464 WScript.exe cmd.exe PID 2464 wrote to memory of 2724 2464 WScript.exe cmd.exe PID 2724 wrote to memory of 2500 2724 cmd.exe taskkill.exe PID 2724 wrote to memory of 2500 2724 cmd.exe taskkill.exe PID 2724 wrote to memory of 2500 2724 cmd.exe taskkill.exe PID 2724 wrote to memory of 2500 2724 cmd.exe taskkill.exe PID 2724 wrote to memory of 2500 2724 cmd.exe taskkill.exe PID 2724 wrote to memory of 2500 2724 cmd.exe taskkill.exe PID 2724 wrote to memory of 2500 2724 cmd.exe taskkill.exe PID 2492 wrote to memory of 2788 2492 cmd.exe taskkill.exe PID 2492 wrote to memory of 2788 2492 cmd.exe taskkill.exe PID 2492 wrote to memory of 2788 2492 cmd.exe taskkill.exe PID 2492 wrote to memory of 2788 2492 cmd.exe taskkill.exe PID 2492 wrote to memory of 2788 2492 cmd.exe taskkill.exe PID 2492 wrote to memory of 2788 2492 cmd.exe taskkill.exe PID 2492 wrote to memory of 2788 2492 cmd.exe taskkill.exe PID 2724 wrote to memory of 2556 2724 cmd.exe taskkill.exe PID 2724 wrote to memory of 2556 2724 cmd.exe taskkill.exe PID 2724 wrote to memory of 2556 2724 cmd.exe taskkill.exe PID 2724 wrote to memory of 2556 2724 cmd.exe taskkill.exe PID 2724 wrote to memory of 2556 2724 cmd.exe taskkill.exe PID 2724 wrote to memory of 2556 2724 cmd.exe taskkill.exe PID 2724 wrote to memory of 2556 2724 cmd.exe taskkill.exe PID 2492 wrote to memory of 2920 2492 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\183f0ac56267fcfa87570e3533b17dcb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\183f0ac56267fcfa87570e3533b17dcb_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\tests.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
\??\c:\admi.exeadmi.exe -p12345 -dc:\3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\install.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\install.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f6⤵PID:556
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"6⤵
- Runs .reg file with regedit
PID:2496
-
-
C:\Windows\SysWOW64\timeout.exetimeout 26⤵
- Delays execution with timeout.exe
PID:1672
-
-
\??\c:\rutserv.exerutserv.exe /silentinstall6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:500
-
-
\??\c:\rutserv.exerutserv.exe /firewall6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1528
-
-
\??\c:\rutserv.exerutserv.exe /start6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\install.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f5⤵PID:2920
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"5⤵
- Runs .reg file with regedit
PID:1676
-
-
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:2024
-
-
\??\c:\rutserv.exerutserv.exe /silentinstall5⤵
- Executes dropped EXE
PID:1820
-
-
\??\c:\rutserv.exerutserv.exe /firewall5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1608
-
-
\??\c:\rutserv.exerutserv.exe /start5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1264
-
-
-
-
-
\??\c:\rutserv.exec:\rutserv.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2284 -
\??\c:\rfusclient.exec:\rfusclient.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:324 -
\??\c:\rfusclient.exec:\rfusclient.exe /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1540
-
-
-
\??\c:\rfusclient.exec:\rfusclient.exe /tray2⤵
- Executes dropped EXE
PID:1828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
289B
MD5a60d06edbd2b022c5009b0606c1e7481
SHA1300432e9ebf424dd8e97f405ea2d64c0388c8749
SHA256b7bdf067aca5eb9fd2b83b2b17195022fb4c684680bcdb278d158e9f77db10a2
SHA512ded38d51fc5dd90f38a76613646111eb6a44f7d7db01b3e17debff4c779d0f222d7b99820785af1b1d13fa2954557ded03e11a441277668d9dfe729fe824028d
-
Filesize
117B
MD565fc32766a238ff3e95984e325357dbb
SHA13ac16a2648410be8aa75f3e2817fbf69bb0e8922
SHA256a7b067e9e4d44efe579c7cdb1e847d61af2323d3d73c6fffb22e178ae476f420
SHA512621e81fc2d0f9dd92413481864638a140bee94c7dbd31f944826b21bd6ad6b8a59e63de9f7f0025cffc0efb7f9975dde77f523510ee23ada62c152a63a22f608
-
Filesize
22B
MD5d4b0e840fe4def0621f001fde561e5b9
SHA1ddb72ac6c5a5eb438ba1c978e48922f9ea30d50f
SHA256afa70763c180373e6a669f3e5ad09141f5baa03e3d1a40e65e8ba36694c82d66
SHA5124a1c440735af0db34eabe8698a3e28ab8658d62ecced39aeee2dfeee4a75653221ef91c0362311eb92d9752efe1d24aaf49d0fd191289eb75758ed201bd3f3b6
-
Filesize
4.1MB
MD566c240a84a50ff544a5ca49d714c76d4
SHA199173116f3c04acadbd943a69a68a030d6513bf1
SHA256f4da4eb7c0b7e6bbb98162a7fdf558aac39aaf9caf52531cbe2fe41bb46fec2d
SHA512075a5afbe16ba014b339de380c9689514628c84bbcb8a89321a2a6b41eb9733d48db73b702f03d0cdf4f641c060f2ca7d8e39a059cd70ff382e6e85a58e17943
-
Filesize
11KB
MD554b11bea17cfd51834a5e6cc265f1637
SHA11aa9823410a37e8e9a11b81b9b33f9e03f310ad7
SHA25612af76d157ec14db12588aa0e97d2b0e69f822e2e83ba5909fdfd201f90c6378
SHA5128b534df7d61c8ba1a55d2b51c4aae9074278a22a82a732ce199e08871fc0ff2b50c0db352ab52b3e1abcf9c5efc473ab33180a2df01423ec28203aa561fcbaf2
-
Filesize
1.5MB
MD5b8667a1e84567fcf7821bcefb6a444af
SHA19c1f91fe77ad357c8f81205d65c9067a270d61f0
SHA256dc9d875e659421a51addd8e8a362c926369e84320ab0c5d8bbb1e4d12d372fc9
SHA512ec6af663a3b41719d684f04504746f91196105ef6f8baa013b4bd02df6684eca49049d5517691f8e3a4ba6351fe35545a27f728b1d29d949e950d574a012f852
-
Filesize
1.7MB
MD537a8802017a212bb7f5255abc7857969
SHA1cb10c0d343c54538d12db8ed664d0a1fa35b6109
SHA2561699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6
SHA5124e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0
-
Filesize
155KB
MD588318158527985702f61d169434a4940
SHA13cc751ba256b5727eb0713aad6f554ff1e7bca57
SHA2564c04d7968a9fe9d9258968d3a722263334bbf5f8af972f206a71f17fa293aa74
SHA5125d88562b6c6d2a5b14390512712819238cd838914f7c48a27f017827cb9b825c24ff05a30333427acec93cd836e8f04158b86d17e6ac3dd62c55b2e2ff4e2aff
-
Filesize
593KB
MD56298c0af3d1d563834a218a9cc9f54bd
SHA10185cd591e454ed072e5a5077b25c612f6849dc9
SHA25681af82019d9f45a697a8ca1788f2c5c0205af9892efd94879dedf4bc06db4172
SHA512389d89053689537cdb582c0e8a7951a84549f0c36484db4346c31bdbe7cb93141f6a354069eb13e550297dc8ec35cd6899746e0c16abc876a0fe542cc450fffe