Malware Analysis Report

2025-01-03 08:22

Sample ID 240704-l5rzcsxflb
Target 258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118
SHA256 eaba03bf14493232eb1f6a3367cb9074edac1386053f1842a465aad039050ea0
Tags
metasploit persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

eaba03bf14493232eb1f6a3367cb9074edac1386053f1842a465aad039050ea0

Threat Level: Known bad

The file 258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

metasploit persistence

Metasploit family

Event Triggered Execution: Image File Execution Options Injection

Drops file in System32 directory

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Runs net.exe

Suspicious behavior: LoadsDriver

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-04 10:07

Signatures

Metasploit family

metasploit

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-04 10:07

Reported

2024-07-04 10:09

Platform

win7-20240611-en

Max time kernel

149s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe"

Signatures

Event Triggered Execution: Image File Execution Options Injection

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavsvc.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rising.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVmonD.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravtimer.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVFW.EXE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ati2evxx.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\runiep.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\runiep.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rising.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapsvc.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavsvc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVmon.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVFW.EXE.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVwsc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ati2evxx.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVsvcUI.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVsvcUI.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapsvc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVsrvXP.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVmonD.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravtimer.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVsrvXP.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVwsc.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapw32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapw32.exe C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\tpnc.bat C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\wpcap.dll C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\tutilitys.txt C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\wsusb32.sys C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Windows\system32\tpnc.bat

C:\Windows\SysWOW64\net.exe

net stop sharedaccess

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop sharedaccess

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.aaat8.com udp
US 208.91.197.46:80 www.aaat8.com tcp

Files

C:\Windows\SysWOW64\tpnc.bat

MD5 7b16cc4ebd5af5d255eeb8a7b487875b
SHA1 3f679d76efb21f7b2249ddc2a0d8a68d71220d16
SHA256 5040cfcc7def4d52830218981dc6cb729abe9eb3b1a38d8df5c56698336098b1
SHA512 7f16419eddc8cedb0e133fe482a958cf6997b8b30456a3f3949066e9279fef888e1297065850f77bdae189a5d93e6bc69eb6e33d73ef1e0d64642f2fb2ff61d0

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-04 10:07

Reported

2024-07-04 10:09

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe"

Signatures

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\wpcap.dll C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\tutilitys.txt C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\wsusb32.sys C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\tpnc.bat C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\B^«Ê?ó×õ íÓ$Á C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Windows\system32\tpnc.bat

C:\Windows\SysWOW64\net.exe

net stop sharedaccess

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop sharedaccess

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
N/A 10.127.1.176:445 tcp
US 8.8.8.8:53 www.aaat8.com udp
N/A 10.127.1.226:445 tcp
US 208.91.197.46:80 www.aaat8.com tcp
N/A 10.127.1.176:139 tcp
N/A 10.127.1.151:445 tcp
N/A 10.127.1.76:445 tcp
N/A 10.127.1.51:445 tcp
N/A 10.127.1.26:445 tcp
N/A 10.127.1.201:445 tcp
N/A 10.127.1.126:445 tcp
N/A 10.127.1.101:445 tcp
N/A 10.127.1.1:445 tcp
N/A 10.127.1.226:139 tcp
US 8.8.8.8:53 46.197.91.208.in-addr.arpa udp
N/A 10.127.1.151:139 tcp
N/A 10.127.1.201:139 tcp
N/A 10.127.1.51:139 tcp
N/A 10.127.1.76:139 tcp
N/A 10.127.1.101:139 tcp
N/A 10.127.1.26:139 tcp
N/A 10.127.1.1:139 tcp
N/A 10.127.1.126:139 tcp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 176.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 226.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 1.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 76.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 26.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 151.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 51.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 201.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 126.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 101.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
N/A 10.127.1.176:445 tcp
N/A 10.127.1.226:445 tcp
N/A 10.127.1.176:139 tcp
N/A 10.127.1.76:445 tcp
N/A 10.127.1.151:445 tcp
N/A 10.127.1.26:445 tcp
N/A 10.127.1.1:445 tcp
N/A 10.127.1.51:445 tcp
N/A 10.127.1.201:445 tcp
N/A 10.127.1.101:445 tcp
N/A 10.127.1.126:445 tcp
N/A 10.127.1.226:139 tcp
N/A 10.127.1.151:139 tcp
N/A 10.127.1.76:139 tcp
N/A 10.127.1.1:139 tcp
N/A 10.127.1.26:139 tcp
N/A 10.127.1.201:139 tcp
N/A 10.127.1.51:139 tcp
N/A 10.127.1.101:139 tcp
N/A 10.127.1.126:139 tcp
N/A 10.127.1.202:445 tcp
N/A 10.127.1.177:445 tcp
N/A 10.127.1.227:445 tcp
N/A 10.127.1.2:445 tcp
N/A 10.127.1.127:445 tcp
N/A 10.127.1.77:445 tcp
N/A 10.127.1.52:445 tcp
N/A 10.127.1.102:445 tcp
N/A 10.127.1.152:445 tcp
N/A 10.127.1.27:445 tcp
N/A 10.127.1.202:139 tcp
N/A 10.127.1.177:139 tcp
N/A 10.127.1.227:139 tcp
N/A 10.127.1.2:139 tcp
N/A 10.127.1.127:139 tcp
N/A 10.127.1.27:139 tcp
N/A 10.127.1.152:139 tcp
N/A 10.127.1.77:139 tcp
N/A 10.127.1.102:139 tcp
N/A 10.127.1.52:139 tcp
US 8.8.8.8:53 202.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 227.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 127.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 27.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 77.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 177.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 52.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 2.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 102.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 152.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 130.109.69.13.in-addr.arpa udp

Files

C:\Windows\SysWOW64\tpnc.bat

MD5 7b16cc4ebd5af5d255eeb8a7b487875b
SHA1 3f679d76efb21f7b2249ddc2a0d8a68d71220d16
SHA256 5040cfcc7def4d52830218981dc6cb729abe9eb3b1a38d8df5c56698336098b1
SHA512 7f16419eddc8cedb0e133fe482a958cf6997b8b30456a3f3949066e9279fef888e1297065850f77bdae189a5d93e6bc69eb6e33d73ef1e0d64642f2fb2ff61d0