Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe
-
Size
423KB
-
MD5
19f3dbb5124851c4a2cead8606fcf40a
-
SHA1
8658ed712d843ab7f574a8df9de8b3f7cbdf19a2
-
SHA256
43fa64424268d736f48549f5fbdbf704f08f357c4f9f47dce772b0b8ab39e1f4
-
SHA512
aa58b784a30afa4dfa1afc493ebc868f157450f0e979fbdf959938c50473277fd8ad7e8eb015f34bafc957c566b7bb88602d7a45dba4130b14b40e4f78695a0f
-
SSDEEP
12288:zlkP801a58gNyPCYCU4zqM8XH2d/Coik6M:GP9wVHQHux
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2700 kAk24512dCbIc24512.exe -
Executes dropped EXE 2 IoCs
pid Process 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe -
Loads dropped DLL 1 IoCs
pid Process 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2996-1-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/3056-14-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2996-21-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2700-25-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/3056-31-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2700-32-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/3056-39-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2700-45-0x0000000000400000-0x00000000004C8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\kAk24512dCbIc24512 = "C:\\ProgramData\\kAk24512dCbIc24512\\kAk24512dCbIc24512.exe" kAk24512dCbIc24512.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main kAk24512dCbIc24512.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 3056 kAk24512dCbIc24512.exe 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 3056 kAk24512dCbIc24512.exe 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 3056 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe 3056 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe Token: SeDebugPrivilege 3056 kAk24512dCbIc24512.exe Token: SeDebugPrivilege 2700 kAk24512dCbIc24512.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2700 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2700 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2700 kAk24512dCbIc24512.exe 2700 kAk24512dCbIc24512.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2996 wrote to memory of 3056 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 28 PID 2996 wrote to memory of 3056 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 28 PID 2996 wrote to memory of 3056 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 28 PID 2996 wrote to memory of 3056 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 28 PID 2996 wrote to memory of 2700 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 29 PID 2996 wrote to memory of 2700 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 29 PID 2996 wrote to memory of 2700 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 29 PID 2996 wrote to memory of 2700 2996 19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\ProgramData\kAk24512dCbIc24512\kAk24512dCbIc24512.exe"C:\ProgramData\kAk24512dCbIc24512\kAk24512dCbIc24512.exe" BOMBARDAMAXIMUM2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\ProgramData\kAk24512dCbIc24512\kAk24512dCbIc24512.exe"C:\ProgramData\kAk24512dCbIc24512\kAk24512dCbIc24512.exe" "C:\Users\Admin\AppData\Local\Temp\19f3dbb5124851c4a2cead8606fcf40a_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5822f89b944cef1934ab9cf703f08094a
SHA138794d450bab384968fca194605f0756fc274948
SHA2563ab831e1ebe703b0144edd6b4c5104415f26dc915eed661c133b3f493dfd1d93
SHA5129d8f7591d2bd5b60a8683d9be5c8e8ecd5fbf188b84644101b4df4ba737fa631fdbbe58d009e2376eca21ce4f1ffbf3d964208c7dd7d55041eeec17c14484e25
-
Filesize
423KB
MD519f3dbb5124851c4a2cead8606fcf40a
SHA18658ed712d843ab7f574a8df9de8b3f7cbdf19a2
SHA25643fa64424268d736f48549f5fbdbf704f08f357c4f9f47dce772b0b8ab39e1f4
SHA512aa58b784a30afa4dfa1afc493ebc868f157450f0e979fbdf959938c50473277fd8ad7e8eb015f34bafc957c566b7bb88602d7a45dba4130b14b40e4f78695a0f