Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 09:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2fc23316b472ea5e9b1bc423b185fee8_JaffaCakes118.exe
Resource
win7-20240704-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2fc23316b472ea5e9b1bc423b185fee8_JaffaCakes118.exe
Resource
win10v2004-20240704-en
4 signatures
150 seconds
General
-
Target
2fc23316b472ea5e9b1bc423b185fee8_JaffaCakes118.exe
-
Size
106KB
-
MD5
2fc23316b472ea5e9b1bc423b185fee8
-
SHA1
710b6514e7d3d7084725442776f73b308215dcc8
-
SHA256
89628fa6dc9baa71062bff28cf9f10cef13778060835818d39e8044606d64b41
-
SHA512
42bd09e48e5c6e0b09afbde79f253bfeee47c57f7fc421e785fe61d9cc191b0035059a745a86c90fabf20c6a8a049c2889b208bd0ff1cadbb77c6cb0bb4300b7
-
SSDEEP
3072:i84yC4Yh41m9ssbdA+lj5LKZdg1HXOe75YkimI24ljmwfBR:i84yh1m9Bbdz5LK0leeWki/lK
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\ncot.tlb 2fc23316b472ea5e9b1bc423b185fee8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ncot.tlb 2fc23316b472ea5e9b1bc423b185fee8_JaffaCakes118.exe File created C:\Windows\SysWOW64\xwentra.sys 2fc23316b472ea5e9b1bc423b185fee8_JaffaCakes118.exe File created C:\Windows\SysWOW64\xwentra.sys_ 2fc23316b472ea5e9b1bc423b185fee8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\xwentra.sys 2fc23316b472ea5e9b1bc423b185fee8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5024 2fc23316b472ea5e9b1bc423b185fee8_JaffaCakes118.exe 5024 2fc23316b472ea5e9b1bc423b185fee8_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5024 2fc23316b472ea5e9b1bc423b185fee8_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fc23316b472ea5e9b1bc423b185fee8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2fc23316b472ea5e9b1bc423b185fee8_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024