Analysis
-
max time kernel
91s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe
-
Size
294KB
-
MD5
22ce3654742c1f02ae5f343878ca71b5
-
SHA1
e118b7c26d76d7b12a636d33cb1bb5ad9cf2bff6
-
SHA256
c3f34fab69c9f02d998500e31402c2ac142b0d209cfd2568619bc9fc0853e5dd
-
SHA512
f224dd0facf37e830a8fade9d9b5932699595e87f7f051debd2dbe2ed02644b9f6f6d69cf3ae29f14798d4d70f8b8094c9d8a30c2b5ee43109803631ecca6fb1
-
SSDEEP
6144:zzZIhI966AGkAjOpoaY7qAAY27yZniIms+QTf6f:5wq6xGJOpqURypiI3Cf
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\beep.sys 22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers\beep.sys dark.exe -
Executes dropped EXE 1 IoCs
pid Process 4836 dark.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\dark.exe 22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\dark.exe 22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe File created C:\Windows\SysWOW64\dark.exe dark.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1624 22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4836 dark.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1624 wrote to memory of 4836 1624 22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe 80 PID 1624 wrote to memory of 4836 1624 22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe 80 PID 1624 wrote to memory of 4836 1624 22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe 80 PID 1624 wrote to memory of 4772 1624 22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe 81 PID 1624 wrote to memory of 4772 1624 22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe 81 PID 1624 wrote to memory of 4772 1624 22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe 81 PID 4836 wrote to memory of 2280 4836 dark.exe 82 PID 4836 wrote to memory of 2280 4836 dark.exe 82 PID 4836 wrote to memory of 2280 4836 dark.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\22ce3654742c1f02ae5f343878ca71b5_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\dark.exe"C:\Windows\system32\dark.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\dark.exe > nul3⤵PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\22CE36~1.EXE > nul2⤵PID:4772
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294KB
MD522ce3654742c1f02ae5f343878ca71b5
SHA1e118b7c26d76d7b12a636d33cb1bb5ad9cf2bff6
SHA256c3f34fab69c9f02d998500e31402c2ac142b0d209cfd2568619bc9fc0853e5dd
SHA512f224dd0facf37e830a8fade9d9b5932699595e87f7f051debd2dbe2ed02644b9f6f6d69cf3ae29f14798d4d70f8b8094c9d8a30c2b5ee43109803631ecca6fb1
-
Filesize
2KB
MD55fd668ad46277cc087c14569bd508f7b
SHA1a401a642806991b49e39a08862fa5d462cf37bb6
SHA256aeeb1db06947f713973e60e1e87e9d5e0de15904586137b55a37d88925222662
SHA51251d303862887aec41d04bf1a00c1a43ca6c9f0ec91d2f0736a517250d11840e482c09e63447ec4ebc746b8328881d6fbd17ea401fc54e1044e41816f42175b1c