Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 07:00
Static task
static1
Behavioral task
behavioral1
Sample
2b660ef15fe01081fe07d5abe83c9b36_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b660ef15fe01081fe07d5abe83c9b36_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b660ef15fe01081fe07d5abe83c9b36_JaffaCakes118.exe
-
Size
520KB
-
MD5
2b660ef15fe01081fe07d5abe83c9b36
-
SHA1
56b5597e22618f21d30586e621c5f276ea7c2931
-
SHA256
426721efc81727101498320642651960b684dcc5546baf6881f6afac4fdf36c9
-
SHA512
b46ff0415e8b762ee8deffbf349d92d2d95c0ec2f09c16f2a8c03f9d8307a30a391cae7e3ade6586052d03009d31b31043992a1685631cc043a66b4d56cc3079
-
SSDEEP
12288:ydiM1Wtvs51uGnPOj7sJIdcu8sjI8UMty0ZazH:aidtE51hPOwISsRhy0A
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2968 winine.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ieapfltr.dat 2b660ef15fe01081fe07d5abe83c9b36_JaffaCakes118.exe File created C:\Windows\SysWOW64\winine.exe 2b660ef15fe01081fe07d5abe83c9b36_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winine.exe 2b660ef15fe01081fe07d5abe83c9b36_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ieapfltr.dat winine.exe File opened for modification C:\Windows\SysWOW64\winine.exe winine.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1644 2b660ef15fe01081fe07d5abe83c9b36_JaffaCakes118.exe Token: SeDebugPrivilege 2968 winine.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b660ef15fe01081fe07d5abe83c9b36_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b660ef15fe01081fe07d5abe83c9b36_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
C:\Windows\SysWOW64\winine.exeC:\Windows\SysWOW64\winine.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2968
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD52b660ef15fe01081fe07d5abe83c9b36
SHA156b5597e22618f21d30586e621c5f276ea7c2931
SHA256426721efc81727101498320642651960b684dcc5546baf6881f6afac4fdf36c9
SHA512b46ff0415e8b762ee8deffbf349d92d2d95c0ec2f09c16f2a8c03f9d8307a30a391cae7e3ade6586052d03009d31b31043992a1685631cc043a66b4d56cc3079