Analysis
-
max time kernel
147s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe
-
Size
24KB
-
MD5
2c6c87978946a950ba6b81ee66fda7ff
-
SHA1
e4966b915de20213822602c7f47ab13c281e8eb5
-
SHA256
2bb42083d734c9964146d80917c375efd901c60a2019c1b324687c08c1e22e7e
-
SHA512
ccc41dd1540305319d2c24c756a2f58f37ad8f84a92882953a24835ef10546e222ead636e9ff413639574b841eb272487ec83a120298099dee8076aa28b1ac90
-
SSDEEP
384:pvn/zka8gR9oHZGFkMFCRRMQ1FwhC4uZ99m7vwqfhX3RQP:pwas8CRvw04YgkAR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1344 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1560 system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 12 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe File opened (read-only) \??\E: system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe File opened (read-only) \??\G: system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe File opened (read-only) \??\I: system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe File opened (read-only) \??\J: system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe File opened (read-only) \??\H: system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe File opened (read-only) \??\K: system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe File opened (read-only) \??\E: 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe File opened (read-only) \??\G: 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe File opened (read-only) \??\H: 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe File opened (read-only) \??\I: 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe File opened (read-only) \??\J: 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe File opened for modification C:\Windows\system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2296 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 2296 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 2296 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 2296 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 1560 system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 2296 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 2296 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 1560 system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 1560 system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 1560 system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2296 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1344 2296 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 31 PID 2296 wrote to memory of 1344 2296 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 31 PID 2296 wrote to memory of 1344 2296 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 31 PID 2296 wrote to memory of 1344 2296 2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2C6C87~1.EXE > nul2⤵
- Deletes itself
PID:1344
-
-
C:\Windows\system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exeC:\Windows\system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:1560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD52c6c87978946a950ba6b81ee66fda7ff
SHA1e4966b915de20213822602c7f47ab13c281e8eb5
SHA2562bb42083d734c9964146d80917c375efd901c60a2019c1b324687c08c1e22e7e
SHA512ccc41dd1540305319d2c24c756a2f58f37ad8f84a92882953a24835ef10546e222ead636e9ff413639574b841eb272487ec83a120298099dee8076aa28b1ac90