Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
1bf1d3d8762c1070831846aaff5a0ca1_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1bf1d3d8762c1070831846aaff5a0ca1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1bf1d3d8762c1070831846aaff5a0ca1_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
1bf1d3d8762c1070831846aaff5a0ca1
-
SHA1
1c44771cee5123efd8dcd40cb524bd2d571b834d
-
SHA256
fc6fcf2b00f547b840fa95aad4f84522ee40d45f228bd3ceb7262757a46a0063
-
SHA512
f0a81e635f08cdb20e70bd4b5c923e6f0ed719f4ac35724ed37f7d205b57ed4f20f4f8ef5802963dcac537571968b9bd18b322d376d215ea443c32f56a2cfadb
-
SSDEEP
24576:F56m/BbDiBpCHPodc0NgJFG1Wnqxr5l37iNLopSkUTNnr30MmVykeA:F56m/1DiBAUaGCSltMo8kytkr
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4356 ttsy.exe 4196 Windows XP-087 .exe 704 3D Studio Max.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\3D Studio Max.exe Windows XP-087 .exe File opened for modification C:\Windows\3D Studio Max.exe Windows XP-087 .exe File created C:\Windows\GUOCYOKl.BAT Windows XP-087 .exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4356 ttsy.exe 4356 ttsy.exe 4356 ttsy.exe 4356 ttsy.exe 4356 ttsy.exe 4356 ttsy.exe 4356 ttsy.exe 4356 ttsy.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4196 Windows XP-087 .exe Token: SeDebugPrivilege 704 3D Studio Max.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 704 3D Studio Max.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3216 wrote to memory of 1328 3216 1bf1d3d8762c1070831846aaff5a0ca1_JaffaCakes118.exe 81 PID 3216 wrote to memory of 1328 3216 1bf1d3d8762c1070831846aaff5a0ca1_JaffaCakes118.exe 81 PID 3216 wrote to memory of 1328 3216 1bf1d3d8762c1070831846aaff5a0ca1_JaffaCakes118.exe 81 PID 3216 wrote to memory of 4152 3216 1bf1d3d8762c1070831846aaff5a0ca1_JaffaCakes118.exe 82 PID 3216 wrote to memory of 4152 3216 1bf1d3d8762c1070831846aaff5a0ca1_JaffaCakes118.exe 82 PID 3216 wrote to memory of 4152 3216 1bf1d3d8762c1070831846aaff5a0ca1_JaffaCakes118.exe 82 PID 1328 wrote to memory of 4356 1328 cmd.exe 85 PID 1328 wrote to memory of 4356 1328 cmd.exe 85 PID 1328 wrote to memory of 4356 1328 cmd.exe 85 PID 4152 wrote to memory of 4196 4152 cmd.exe 86 PID 4152 wrote to memory of 4196 4152 cmd.exe 86 PID 4152 wrote to memory of 4196 4152 cmd.exe 86 PID 704 wrote to memory of 2912 704 3D Studio Max.exe 89 PID 704 wrote to memory of 2912 704 3D Studio Max.exe 89 PID 4196 wrote to memory of 4696 4196 Windows XP-087 .exe 90 PID 4196 wrote to memory of 4696 4196 Windows XP-087 .exe 90 PID 4196 wrote to memory of 4696 4196 Windows XP-087 .exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bf1d3d8762c1070831846aaff5a0ca1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1bf1d3d8762c1070831846aaff5a0ca1_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\\ttsy.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\ttsy.exeC:\Users\Admin\AppData\Local\Temp\\ttsy.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\\Windows XP-087 .exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\Windows XP-087 .exe"C:\Users\Admin\AppData\Local\Temp\\Windows XP-087 .exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\GUOCYOKl.BAT4⤵PID:4696
-
-
-
-
C:\Windows\3D Studio Max.exe"C:\Windows\3D Studio Max.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2912
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
564KB
MD5100646dc15881287b7993ee6b5abeab5
SHA19d26f5fd66b4164c18abd6b4e2da1f5095cb14d6
SHA256b0c359a9f7c774b4d808be3eb89530b5cc48f876f66f1f86897c147eda60353c
SHA512f62e3da861232c7d68b4924cccd76d7b22191b0f3c895d9799166f353f3b1134f78b32b3ed28944d4e80b3571de63950551fe3d7877918267d61c94d3e7cfba1
-
Filesize
664KB
MD5174bdd918a7deeb4a390c5b29f82f2a3
SHA1480fc28d79b8beffce8a61c35b94ad83240c9eea
SHA256f515c30b08c1048378ba101a60172f80ca9a1caa00e42b0ad8448f088fcdb659
SHA51221e315a16d32287d2111a51a83b72da0bfe13b3a286316ea430d8c5cf4739209bfdbfea44112c685a43d2e914f6966da2ee80b4d2db72fe2ed3358863ef7ddb6
-
Filesize
156B
MD5a651ffa9f54ee3d10a35d1e24b647353
SHA1dcd2d98269d3af9e5e7adfd3f0f7c852634a0f04
SHA256e08cc722fab7507183aff05a92c3e9bf86cf94e97a5d23b081a06995dbe9303f
SHA512c33a8092aa033ffe4680dab0c293ffca4fb6e61cb4f61f217311599123df676cbc15ac3bd223f5895a31c0281e87d0c0139b519a4fbf375de1e71a11cad0c508