Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
1c20ebe50cc18579d30a017dcb1d86f2_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1c20ebe50cc18579d30a017dcb1d86f2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1c20ebe50cc18579d30a017dcb1d86f2_JaffaCakes118.exe
-
Size
687KB
-
MD5
1c20ebe50cc18579d30a017dcb1d86f2
-
SHA1
e7e46311ac9afadbfd129c429c24b9836719c66f
-
SHA256
81b816338484ca2a570529308032418d89751ecc29353d4be4b6562edbff21fb
-
SHA512
61d74d11911731e4874a2b104e631cac3c09e7eeef1f56bc9ea88eacefd210216e77ecea027dc399c105f5048ad588d62911e423c680b65a8985e49d21200e3d
-
SSDEEP
12288:HHckPVMxRj3CUjexjlGqqcLlZN0yMLQyF3Z4mxxlDqVTVOCb:nTeGjGVEF00yQmX0VTzb
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3704 4.exe 2060 cmd.exe 1764 4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1c20ebe50cc18579d30a017dcb1d86f2_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\uninstal.bat 4.exe File opened for modification C:\Windows\cmd.exe 4.exe File created C:\Windows\cmd.exe 4.exe File opened for modification C:\Windows\cmd.exe 4.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3704 4.exe Token: SeDebugPrivilege 2060 cmd.exe Token: SeDebugPrivilege 1764 4.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 cmd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 636 wrote to memory of 3704 636 1c20ebe50cc18579d30a017dcb1d86f2_JaffaCakes118.exe 81 PID 636 wrote to memory of 3704 636 1c20ebe50cc18579d30a017dcb1d86f2_JaffaCakes118.exe 81 PID 636 wrote to memory of 3704 636 1c20ebe50cc18579d30a017dcb1d86f2_JaffaCakes118.exe 81 PID 3704 wrote to memory of 2664 3704 4.exe 83 PID 3704 wrote to memory of 2664 3704 4.exe 83 PID 3704 wrote to memory of 2664 3704 4.exe 83 PID 2060 wrote to memory of 1404 2060 cmd.exe 84 PID 2060 wrote to memory of 1404 2060 cmd.exe 84 PID 636 wrote to memory of 1764 636 1c20ebe50cc18579d30a017dcb1d86f2_JaffaCakes118.exe 85 PID 636 wrote to memory of 1764 636 1c20ebe50cc18579d30a017dcb1d86f2_JaffaCakes118.exe 85 PID 636 wrote to memory of 1764 636 1c20ebe50cc18579d30a017dcb1d86f2_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c20ebe50cc18579d30a017dcb1d86f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1c20ebe50cc18579d30a017dcb1d86f2_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat3⤵PID:2664
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\cmd.exeC:\Windows\cmd.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
766KB
MD5570f560896dfbac3822e49de367bed34
SHA10241d99775892b64acf036fe9e51afc8b8454bea
SHA256dae5477977ca2a54f529e67caa0d8a494cb437d79939195f4bb9661b194af8f1
SHA512c738ef4d0a029e69af36d314f8089a7a254435365301a6e4e41ef8f41c587c54c486ed8ff68f4a4593065db0e73d2fd5d77663408a4794014d60174f3fc66292
-
Filesize
150B
MD55edd682a8b1f2bf873300774f954ab03
SHA12cca4e743d02dbccf31b784ea26a60c03dcc9637
SHA256a34c51ec5d2ac66ef75719e7dee61b6e89e74d054712438da2585ec92ce0865a
SHA512916f0e846a38f63aae996e2a3957fa24fed3bcaa6add68c529e3cc0aa063dca49b98d42c92317bfc2f43d745c492e1e1e6f5db0c986b9682f4b9b0cf0afd7bd2