Analysis
-
max time kernel
41s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe
-
Size
52KB
-
MD5
29f9ab1db8e57b21f875eedfb9be2b39
-
SHA1
61269e923c5642fd59f5981112026c396ca55371
-
SHA256
d8e8ccdaa161688473a954669ac45e9e5f5c0df0804d97f94b6c0e5f44b3ffec
-
SHA512
4cfe13870e8b0c752c1023244a209d2d7b5718bcea173eabee581cbd1f3e934fb2bfaf4ad8d3b9e3eae08729ad6c472d1950d688c0c4397312f6ccad929a1f8a
-
SSDEEP
768:RFCn+kwlRe7OZ/UMv0E3Pu6eSU+x8on8yMx3:vM+k+Re78/vT3xN8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1448 skdos.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\skdos.exe skdos.exe File created C:\Windows\SysWOW64\skdos.exe 29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\skdos.exe 29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64 29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64 skdos.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1668 540 WerFault.exe 79 3628 1448 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 540 29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe 540 29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe 1448 skdos.exe 1448 skdos.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 540 29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1448 skdos.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 540 wrote to memory of 1448 540 29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe 83 PID 540 wrote to memory of 1448 540 29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe 83 PID 540 wrote to memory of 1448 540 29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe 83 PID 540 wrote to memory of 4120 540 29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe 84 PID 540 wrote to memory of 4120 540 29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe 84 PID 540 wrote to memory of 4120 540 29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe 84 PID 1448 wrote to memory of 2584 1448 skdos.exe 87 PID 1448 wrote to memory of 2584 1448 skdos.exe 87 PID 1448 wrote to memory of 2584 1448 skdos.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29f9ab1db8e57b21f875eedfb9be2b39_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 4002⤵
- Program crash
PID:1668
-
-
C:\Windows\SysWOW64\skdos.exe"C:\Windows\system32\skdos.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 4003⤵
- Program crash
PID:3628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Windows\SysWOW64\skdos.exe > nul3⤵PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Users\Admin\AppData\Local\Temp\29F9AB~1.EXE > nul2⤵PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 540 -ip 5401⤵PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1448 -ip 14481⤵PID:892
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD529f9ab1db8e57b21f875eedfb9be2b39
SHA161269e923c5642fd59f5981112026c396ca55371
SHA256d8e8ccdaa161688473a954669ac45e9e5f5c0df0804d97f94b6c0e5f44b3ffec
SHA5124cfe13870e8b0c752c1023244a209d2d7b5718bcea173eabee581cbd1f3e934fb2bfaf4ad8d3b9e3eae08729ad6c472d1950d688c0c4397312f6ccad929a1f8a