Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe
-
Size
694KB
-
MD5
2ea237f07c72f72d1095579266d52208
-
SHA1
aba2f503621b64ea6bcc3d4ca7322cf44926148d
-
SHA256
69ce5552382177c0371bcb26b8be1a3aeffd7de5c2b5bab8914707e138752b1e
-
SHA512
1c00ed97527323613bce811e08e71ea5162bf4afdc113a0fbc74a31f05881df8286c3f2ca4e0efdd095a567fedc6770abc835bbbd03bf7e54e29e83fa3259eb6
-
SSDEEP
12288:VutnT8sJsFVifv7cgtlwbjSQe28d0d4at5F3Z4mxxQIeTeuqIi4H1E2N584K:VutnTxgQvwbtaKQmXhyqIlHNNqX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2700 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 Hacker.com.cn.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe 2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe File opened for modification C:\Windows\Hacker.com.cn.exe 2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe File created C:\Windows\uninstal.bat 2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2252 2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe Token: SeDebugPrivilege 2716 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2716 wrote to memory of 3064 2716 Hacker.com.cn.exe 32 PID 2716 wrote to memory of 3064 2716 Hacker.com.cn.exe 32 PID 2716 wrote to memory of 3064 2716 Hacker.com.cn.exe 32 PID 2716 wrote to memory of 3064 2716 Hacker.com.cn.exe 32 PID 2252 wrote to memory of 2700 2252 2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe 33 PID 2252 wrote to memory of 2700 2252 2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe 33 PID 2252 wrote to memory of 2700 2252 2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe 33 PID 2252 wrote to memory of 2700 2252 2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe 33 PID 2252 wrote to memory of 2700 2252 2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe 33 PID 2252 wrote to memory of 2700 2252 2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe 33 PID 2252 wrote to memory of 2700 2252 2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ea237f07c72f72d1095579266d52208_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
PID:2700
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:3064
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
694KB
MD52ea237f07c72f72d1095579266d52208
SHA1aba2f503621b64ea6bcc3d4ca7322cf44926148d
SHA25669ce5552382177c0371bcb26b8be1a3aeffd7de5c2b5bab8914707e138752b1e
SHA5121c00ed97527323613bce811e08e71ea5162bf4afdc113a0fbc74a31f05881df8286c3f2ca4e0efdd095a567fedc6770abc835bbbd03bf7e54e29e83fa3259eb6
-
Filesize
218B
MD58523ae673cde0f0bc6ee069767eefb7e
SHA1dfe40d0aae7949dffba9000edfbdbbd1779e70f2
SHA256dd9289bdc224c7b881449d4d0841f1dbf4617510c0ba8a411e75383c7d50e3d7
SHA512b726ee449532eccf8294a993daa5c42887826707af47c75c1b53328281e915eecc955bfbe11239b8f50920875c4919c0cbe5df8984aae4551f8e8b1b3f7a45d3