Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe
-
Size
350KB
-
MD5
23c493ab28e1bdb0502fb1533ebbb3a7
-
SHA1
51d84fa61b3ec7fecce693b8d7d665ffe2578178
-
SHA256
a760e30220f02f3a75a638403433a35c38d59cf8ffc4d3beb6fccc94974c0f4d
-
SHA512
b7e3e4fa61800eceb6acafaec5b69704b0998074a471e8123f210fb2aa64a0a9cfd9ca9c931adeea2e735ebc891ab5ee9951434184055b0d0ad024f7951fb9a3
-
SSDEEP
6144:lR6VWA3ZOEBlhuj1KAtaFnY0MIq0rJjQ+IG3unvrlJcsS7VZI9d9hyjr:/6VWNcxFYxIq2ZIK+vrlJcd77n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2132 G_Server.exe -
Loads dropped DLL 6 IoCs
pid Process 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\uninstal.bat 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe File created C:\Windows\G_Server.exe 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe File opened for modification C:\Windows\G_Server.exe 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeSecurityPrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeSystemtimePrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeShutdownPrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeDebugPrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeUndockPrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeManageVolumePrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: 33 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: 34 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: 35 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: 36 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe Token: SeDebugPrivilege 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1104 wrote to memory of 772 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe 83 PID 1104 wrote to memory of 772 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe 83 PID 1104 wrote to memory of 772 1104 23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe 83 PID 2132 wrote to memory of 4860 2132 G_Server.exe 89 PID 2132 wrote to memory of 4860 2132 G_Server.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat2⤵PID:772
-
-
C:\Windows\G_Server.exeC:\Windows\G_Server.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4860
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD513f1364c10aaaa09a4f66059c2c8f859
SHA1a05a28eba992e2e15e6b7184b48ba5017a3e4e32
SHA256d9fc7f19c1204e634de4c44cf8bc78eb7bbc879c5c2b64649c72aa48c60fc436
SHA5121f0da83575993d4f7036a474a2ec1b5e2a676225782d6c234515e732f7113cf72f600a2de3286f80e2a7ced4f6f9f71ba4f52f5380534891793112a93d635d3d
-
Filesize
33KB
MD5884d60a1209c2c16046d4e4c8f481698
SHA13bdaa577777cd70b744492010da99d74cc34e549
SHA2565b1b9e753974893937869b01b3373ed34f5e8e1e046d909d33fa4756428c92e7
SHA512edb70444ca24124012d4860d552e4eaa656f7cac81cf7e512ec8dacee0a97c883feaba65bdbab1792e294413bcf0c800a8b69fe7b62bb398f383815a576bd4e1
-
Filesize
17KB
MD555bca483834624d9d1235ba3ac43d8fd
SHA1c3eb3baaa9863583f38cc7fce67e1914c1bd710f
SHA256897c541e061f6c9a120ba8c711f2d7b96e1b588d70528412bdea9761fb02ceed
SHA512e9aaeab71538d5782f3ec8c2ebea1ae8e8cd2e1a7986e26e62a448413a027e1bc5fcba92f93acb73b8555bf16c85c5631477367f9a90c55243a5a8e238deb8df
-
Filesize
350KB
MD523c493ab28e1bdb0502fb1533ebbb3a7
SHA151d84fa61b3ec7fecce693b8d7d665ffe2578178
SHA256a760e30220f02f3a75a638403433a35c38d59cf8ffc4d3beb6fccc94974c0f4d
SHA512b7e3e4fa61800eceb6acafaec5b69704b0998074a471e8123f210fb2aa64a0a9cfd9ca9c931adeea2e735ebc891ab5ee9951434184055b0d0ad024f7951fb9a3
-
Filesize
218B
MD546d40c1b130d9560ddb84cd2abcd8a14
SHA1915672abdb6326694cab40fd46d1c3916f5c2ca9
SHA25602a0a0ea1d4b61414ce445a0f39db55491e9252ef718ad67df9c6b824506a373
SHA512edd0856aed9538b612cef31de6253f137af98d76570902e0a17c08815e369bb5e58ea7b2963569428dcb10d2a86d57a0fb1cce454e8d474d7f1c4cb503bbdd52