Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
332381b759878c0699296e90c2de3bb5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
332381b759878c0699296e90c2de3bb5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
332381b759878c0699296e90c2de3bb5_JaffaCakes118.exe
-
Size
21KB
-
MD5
332381b759878c0699296e90c2de3bb5
-
SHA1
96ebc100e90cc36e60674737acc478e234d27c05
-
SHA256
d9b39536cd788fe3e3ee7c75a03c9091e4f4b70c4f5b8a66685fa5c7672f3e81
-
SHA512
a317f1c7d13517722607fad4f446b0c71a93ec932d4eecc890d44132ee7fb4967be0f069f7ed984fe97871fdf256164c70a5d5ba388b99642af5ee10f1ba183e
-
SSDEEP
384:mfW/WcbNGOuuS5pf+/mZu1PQ0Ki41f3EETMQJctDqy5mzX76hrTTYF1Kfv:1WZu1PbK9vEMmtDxW76hr3/X
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\27096198\ImagePath = "C:\\Windows\\system32\\4C255084.EXE -g" 332381b759878c0699296e90c2de3bb5_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2732 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2956 4C255084.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\4C255084.EXE 332381b759878c0699296e90c2de3bb5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\4C255084.EXE 332381b759878c0699296e90c2de3bb5_JaffaCakes118.exe File created C:\Windows\SysWOW64\4C255084.EXE 4C255084.EXE File created C:\Windows\SysWOW64\F70CB050.DLL 4C255084.EXE File created C:\Windows\SysWOW64\delme.bat 332381b759878c0699296e90c2de3bb5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2956 4C255084.EXE 2956 4C255084.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 1912 332381b759878c0699296e90c2de3bb5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1912 wrote to memory of 2732 1912 332381b759878c0699296e90c2de3bb5_JaffaCakes118.exe 32 PID 1912 wrote to memory of 2732 1912 332381b759878c0699296e90c2de3bb5_JaffaCakes118.exe 32 PID 1912 wrote to memory of 2732 1912 332381b759878c0699296e90c2de3bb5_JaffaCakes118.exe 32 PID 1912 wrote to memory of 2732 1912 332381b759878c0699296e90c2de3bb5_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\332381b759878c0699296e90c2de3bb5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\332381b759878c0699296e90c2de3bb5_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\delme.bat2⤵
- Deletes itself
PID:2732
-
-
C:\Windows\SysWOW64\4C255084.EXEC:\Windows\SysWOW64\4C255084.EXE -g1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5332381b759878c0699296e90c2de3bb5
SHA196ebc100e90cc36e60674737acc478e234d27c05
SHA256d9b39536cd788fe3e3ee7c75a03c9091e4f4b70c4f5b8a66685fa5c7672f3e81
SHA512a317f1c7d13517722607fad4f446b0c71a93ec932d4eecc890d44132ee7fb4967be0f069f7ed984fe97871fdf256164c70a5d5ba388b99642af5ee10f1ba183e
-
Filesize
239B
MD5a59ef07b01a94034b52eb752d3962c1a
SHA173f059568dd9b224edb783c5e06e35a4a526a788
SHA2562bf69efd0bb7e5f22330898d3689afd37bed2c05c2a6376a473365bda5c9d982
SHA512034fa3f1059cae44737d330a785a7b872edd4791465334f61ed7785e5e14a9e36c83d6c3094b54aa871acbbb16543427ed17f7891bdf1d8983f44778d768cf93