Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 23:24
Static task
static1
Behavioral task
behavioral1
Sample
269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
269d9f6ac6b946701cf600ea0d2f73d6
-
SHA1
0ced0963eec39151c0f0ee0b9b2bf5bf16d5abfe
-
SHA256
0038c749e3133c091063b6ed03ca93d9576a45e90a9def410c05c11be6eb8718
-
SHA512
19986a042b1bb797052d3cdc92d1f56aef5855333f07a2e9f85aa63693c420c5154071c9efcd7ba0a492807f671aa50abe8c8f9b08eda380d489a9332e27c2e5
-
SSDEEP
24576:P1S5ytTKkCBuS0JRWFVbp/4cwqAXagbzwM36:P19tfCBu3JRWF3/4egPN6
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2668 MsiExec.exe 2668 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2432 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2432 msiexec.exe Token: SeIncreaseQuotaPrivilege 2432 msiexec.exe Token: SeRestorePrivilege 2704 msiexec.exe Token: SeTakeOwnershipPrivilege 2704 msiexec.exe Token: SeSecurityPrivilege 2704 msiexec.exe Token: SeCreateTokenPrivilege 2432 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2432 msiexec.exe Token: SeLockMemoryPrivilege 2432 msiexec.exe Token: SeIncreaseQuotaPrivilege 2432 msiexec.exe Token: SeMachineAccountPrivilege 2432 msiexec.exe Token: SeTcbPrivilege 2432 msiexec.exe Token: SeSecurityPrivilege 2432 msiexec.exe Token: SeTakeOwnershipPrivilege 2432 msiexec.exe Token: SeLoadDriverPrivilege 2432 msiexec.exe Token: SeSystemProfilePrivilege 2432 msiexec.exe Token: SeSystemtimePrivilege 2432 msiexec.exe Token: SeProfSingleProcessPrivilege 2432 msiexec.exe Token: SeIncBasePriorityPrivilege 2432 msiexec.exe Token: SeCreatePagefilePrivilege 2432 msiexec.exe Token: SeCreatePermanentPrivilege 2432 msiexec.exe Token: SeBackupPrivilege 2432 msiexec.exe Token: SeRestorePrivilege 2432 msiexec.exe Token: SeShutdownPrivilege 2432 msiexec.exe Token: SeDebugPrivilege 2432 msiexec.exe Token: SeAuditPrivilege 2432 msiexec.exe Token: SeSystemEnvironmentPrivilege 2432 msiexec.exe Token: SeChangeNotifyPrivilege 2432 msiexec.exe Token: SeRemoteShutdownPrivilege 2432 msiexec.exe Token: SeUndockPrivilege 2432 msiexec.exe Token: SeSyncAgentPrivilege 2432 msiexec.exe Token: SeEnableDelegationPrivilege 2432 msiexec.exe Token: SeManageVolumePrivilege 2432 msiexec.exe Token: SeImpersonatePrivilege 2432 msiexec.exe Token: SeCreateGlobalPrivilege 2432 msiexec.exe Token: SeCreateTokenPrivilege 2432 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2432 msiexec.exe Token: SeLockMemoryPrivilege 2432 msiexec.exe Token: SeIncreaseQuotaPrivilege 2432 msiexec.exe Token: SeMachineAccountPrivilege 2432 msiexec.exe Token: SeTcbPrivilege 2432 msiexec.exe Token: SeSecurityPrivilege 2432 msiexec.exe Token: SeTakeOwnershipPrivilege 2432 msiexec.exe Token: SeLoadDriverPrivilege 2432 msiexec.exe Token: SeSystemProfilePrivilege 2432 msiexec.exe Token: SeSystemtimePrivilege 2432 msiexec.exe Token: SeProfSingleProcessPrivilege 2432 msiexec.exe Token: SeIncBasePriorityPrivilege 2432 msiexec.exe Token: SeCreatePagefilePrivilege 2432 msiexec.exe Token: SeCreatePermanentPrivilege 2432 msiexec.exe Token: SeBackupPrivilege 2432 msiexec.exe Token: SeRestorePrivilege 2432 msiexec.exe Token: SeShutdownPrivilege 2432 msiexec.exe Token: SeDebugPrivilege 2432 msiexec.exe Token: SeAuditPrivilege 2432 msiexec.exe Token: SeSystemEnvironmentPrivilege 2432 msiexec.exe Token: SeChangeNotifyPrivilege 2432 msiexec.exe Token: SeRemoteShutdownPrivilege 2432 msiexec.exe Token: SeUndockPrivilege 2432 msiexec.exe Token: SeSyncAgentPrivilege 2432 msiexec.exe Token: SeEnableDelegationPrivilege 2432 msiexec.exe Token: SeManageVolumePrivilege 2432 msiexec.exe Token: SeImpersonatePrivilege 2432 msiexec.exe Token: SeCreateGlobalPrivilege 2432 msiexec.exe Token: SeCreateTokenPrivilege 2432 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 msiexec.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2432 3016 269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2432 3016 269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2432 3016 269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2432 3016 269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2432 3016 269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2432 3016 269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2432 3016 269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe 28 PID 2704 wrote to memory of 2668 2704 msiexec.exe 30 PID 2704 wrote to memory of 2668 2704 msiexec.exe 30 PID 2704 wrote to memory of 2668 2704 msiexec.exe 30 PID 2704 wrote to memory of 2668 2704 msiexec.exe 30 PID 2704 wrote to memory of 2668 2704 msiexec.exe 30 PID 2704 wrote to memory of 2668 2704 msiexec.exe 30 PID 2704 wrote to memory of 2668 2704 msiexec.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i C:\Users\Admin\AppData\Local\Temp\MSI1130.tmp2⤵
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2432
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1CA0DD4D1BD6180E59DF15A571F33285 C2⤵
- Loads dropped DLL
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
990KB
MD5f01c3aef3d24e7353998210e871a21d6
SHA1679fef77e0e2e62a5ccb1dc7fd8cf25506230fee
SHA256d3ce39f0750052008e4a482d0355d7063800d72e5d287fe18033cad024822928
SHA512b711251d5fb2b38ace8b9c189d60d7adf20b9467feef6230d22f8d084f5bda4c004900b10c19035ad5654862b62898fe75113372b21dbb80030169bf5f27a29f
-
Filesize
209KB
MD5f6a25d999d9d84f6675e1756da57f3f0
SHA11a33d32feb96730824996b59d5ba38446ae5d609
SHA25621100a197e3674e9f68a5dd92ed14a15c1b86611bf7003021cb35beaacf23032
SHA512b2fa4013eecd0747e6f7575058140e95a0755030b58156c9c3246cddb62ff141342872b900ba01e4b2551a6f495f414410dc24ff32ed2e7109c21f038a9dbfa0