Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 05:31
Static task
static1
Behavioral task
behavioral1
Sample
276808deb414c644073593b8d29d886a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
276808deb414c644073593b8d29d886a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
276808deb414c644073593b8d29d886a_JaffaCakes118.exe
-
Size
69KB
-
MD5
276808deb414c644073593b8d29d886a
-
SHA1
145fee5cc7920024b53c089d19ff281d9a4ac428
-
SHA256
cfc5d23ac64eac6d38ee0f3723dec50bba111ef18880b44c3a1fb1081d10902b
-
SHA512
7e4517c7a3bbb3e0bba2c8f09f65007c6485fee39e08bddb5e560c1e300fe44a4df1a9c5df044d27f757f366a1c89b74ae03f916e14e5c49c52e0e42faad497d
-
SSDEEP
1536:3k8qkQtjmO5AI9AYkZULavtR96JJpagWsVC:VajmkVkGLoRs0gdVC
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\z: 276808deb414c644073593b8d29d886a_JaffaCakes118.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\netmenc.exe 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\AFxBSjz4ZY5slIA 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\netddess.exe 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drmgs.sys 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File created C:\Windows\SysWOW64\comsa64.sys 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File created C:\Windows\SysWOW64\tmp2_17653000.bk 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ntio494.sys 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ntio523.sys 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\netmen.exe 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ver.txt 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\netmenc.txt 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\adclient.exe 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\€²§)™÷M 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\netmen.txt 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\comsa64.sys 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ntio495.sys 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\netddess.txt 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File created C:\Windows\SysWOW64\drmgs.sys 276808deb414c644073593b8d29d886a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe Token: SeDebugPrivilege 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2884 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2884 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2884 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2884 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 30 PID 2884 wrote to memory of 2748 2884 net.exe 32 PID 2884 wrote to memory of 2748 2884 net.exe 32 PID 2884 wrote to memory of 2748 2884 net.exe 32 PID 2884 wrote to memory of 2748 2884 net.exe 32 PID 2708 wrote to memory of 2844 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 33 PID 2708 wrote to memory of 2844 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 33 PID 2708 wrote to memory of 2844 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 33 PID 2708 wrote to memory of 2844 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 33 PID 2844 wrote to memory of 2716 2844 net.exe 35 PID 2844 wrote to memory of 2716 2844 net.exe 35 PID 2844 wrote to memory of 2716 2844 net.exe 35 PID 2844 wrote to memory of 2716 2844 net.exe 35 PID 2708 wrote to memory of 2900 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 36 PID 2708 wrote to memory of 2900 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 36 PID 2708 wrote to memory of 2900 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 36 PID 2708 wrote to memory of 2900 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 36 PID 2900 wrote to memory of 2624 2900 net.exe 38 PID 2900 wrote to memory of 2624 2900 net.exe 38 PID 2900 wrote to memory of 2624 2900 net.exe 38 PID 2900 wrote to memory of 2624 2900 net.exe 38 PID 2708 wrote to memory of 2836 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 39 PID 2708 wrote to memory of 2836 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 39 PID 2708 wrote to memory of 2836 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 39 PID 2708 wrote to memory of 2836 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 39 PID 2836 wrote to memory of 2656 2836 net.exe 41 PID 2836 wrote to memory of 2656 2836 net.exe 41 PID 2836 wrote to memory of 2656 2836 net.exe 41 PID 2836 wrote to memory of 2656 2836 net.exe 41 PID 2708 wrote to memory of 2600 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 42 PID 2708 wrote to memory of 2600 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 42 PID 2708 wrote to memory of 2600 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 42 PID 2708 wrote to memory of 2600 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 42 PID 2600 wrote to memory of 2632 2600 net.exe 44 PID 2600 wrote to memory of 2632 2600 net.exe 44 PID 2600 wrote to memory of 2632 2600 net.exe 44 PID 2600 wrote to memory of 2632 2600 net.exe 44 PID 2708 wrote to memory of 2720 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 45 PID 2708 wrote to memory of 2720 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 45 PID 2708 wrote to memory of 2720 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 45 PID 2708 wrote to memory of 2720 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 45 PID 2720 wrote to memory of 2896 2720 net.exe 47 PID 2720 wrote to memory of 2896 2720 net.exe 47 PID 2720 wrote to memory of 2896 2720 net.exe 47 PID 2720 wrote to memory of 2896 2720 net.exe 47 PID 2708 wrote to memory of 376 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 48 PID 2708 wrote to memory of 376 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 48 PID 2708 wrote to memory of 376 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 48 PID 2708 wrote to memory of 376 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 48 PID 376 wrote to memory of 872 376 net.exe 50 PID 376 wrote to memory of 872 376 net.exe 50 PID 376 wrote to memory of 872 376 net.exe 50 PID 376 wrote to memory of 872 376 net.exe 50 PID 2708 wrote to memory of 648 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 51 PID 2708 wrote to memory of 648 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 51 PID 2708 wrote to memory of 648 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 51 PID 2708 wrote to memory of 648 2708 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 51 PID 648 wrote to memory of 2920 648 net.exe 53 PID 648 wrote to memory of 2920 648 net.exe 53 PID 648 wrote to memory of 2920 648 net.exe 53 PID 648 wrote to memory of 2920 648 net.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\276808deb414c644073593b8d29d886a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\276808deb414c644073593b8d29d886a_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmen2⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmen3⤵PID:2748
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmen2⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmen3⤵PID:2716
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmenc2⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmenc3⤵PID:2624
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmenc2⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmenc3⤵PID:2656
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmen2⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmen3⤵PID:2632
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmen2⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmen3⤵PID:2896
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmenc2⤵
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmenc3⤵PID:872
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmenc2⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmenc3⤵PID:2920
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop NetDDESRV2⤵PID:2192
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetDDESRV3⤵PID:2396
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop NetDDESRV2⤵PID:2392
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetDDESRV3⤵PID:2504
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop NetDDESS2⤵PID:2968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetDDESS3⤵PID:3004
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop NetDDESS2⤵PID:3012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetDDESS3⤵PID:2332
-
-