Analysis
-
max time kernel
6s -
max time network
7s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 20:32
Behavioral task
behavioral1
Sample
2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Errors
General
-
Target
2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe
-
Size
10KB
-
MD5
2db493c02c679809e9897ae8279f7579
-
SHA1
54cab9768a353681f36e34ff3be9dcdf3a1f402f
-
SHA256
deb6ee791144ab6d31fa6ca71efe1f9169fd0834b985596a2704778ab43115b8
-
SHA512
2eec1784fbbd77a43042ae759bdff527b05d6971e0684f907877a687e330088c9b5a0660308970d3914922915a4820ac4f277d34a148fa6b51959eaaa0b497f3
-
SSDEEP
192:7gc9THovq3VGytSGCSylrKFaNJhLkwcud2DH9VwGfct8+MUZnhG:r9Mvq3VGytSDmaNJawcudoD7UvbZnhG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2112 b2e.exe -
Loads dropped DLL 2 IoCs
pid Process 2536 2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe 2536 2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2536-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2536-13-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2760 shutdown.exe Token: SeRemoteShutdownPrivilege 2760 shutdown.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2112 2536 2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2112 2536 2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2112 2536 2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2112 2536 2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe 30 PID 2112 wrote to memory of 1940 2112 b2e.exe 31 PID 2112 wrote to memory of 1940 2112 b2e.exe 31 PID 2112 wrote to memory of 1940 2112 b2e.exe 31 PID 2112 wrote to memory of 1940 2112 b2e.exe 31 PID 1940 wrote to memory of 2760 1940 cmd.exe 33 PID 1940 wrote to memory of 2760 1940 cmd.exe 33 PID 1940 wrote to memory of 2760 1940 cmd.exe 33 PID 1940 wrote to memory of 2760 1940 cmd.exe 33 PID 2112 wrote to memory of 2876 2112 b2e.exe 35 PID 2112 wrote to memory of 2876 2112 b2e.exe 35 PID 2112 wrote to memory of 2876 2112 b2e.exe 35 PID 2112 wrote to memory of 2876 2112 b2e.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\BE8E.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\BE8E.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\BE8E.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BEDC.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\shutdown.exeshutdown -s -t 14⤵
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\selfdel0.bat" "3⤵PID:2876
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2884
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD52a29cccbdf814e8c419a200110e51b54
SHA1bb4c5452045ba6f9d6fd71c8824b582bb8426c56
SHA256f1d0b882ca3a6dea35224c0d41d59a19d9be3cee6d7306d0f2df3e1a14170c32
SHA51205915e6c06126f62fa34257c51a6be47e70c257f41199fb8aabaaa768fde3dc6b38c8d37e4677f70fccda62232cb8f0bc284558713410a3cabce749533ba3c18
-
Filesize
158B
MD5c38e82fe557270ffe93325bca61c8988
SHA14ac5c7f6bddb800b27289f806b0861a2d2262590
SHA256dabc8f136f8ef5c5a0e3a723977c08506309675bc80f8e0ee47fb0db37376154
SHA5126c9dc5c8f4b6d11f6d0a8df57b0598278cae055ed3e86f1b427e8a0493961fb46814e9ebb12a6d41361358b299a343bd7c16844dd4d3fe0ef4e07b2ce42f84bf
-
Filesize
8KB
MD52d8e1e29c72b0dd98e33b1d5576b08c9
SHA176d537c192dedc56e98e6ac630e2b68d1352e637
SHA256108fb34ffb70076137698eb27199d6f879f67d0cc5545e66c2c34a389b6630c4
SHA5127d0e7b1d125ee225ad46247eec3ca397158d43a2c154c431d0e8bc41002e239d63bc9e43bab0c9f08f3daf81b8728c79f348e44e8ee535e2eeddb6f0a4fbc360