Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe
-
Size
193KB
-
MD5
347514c3fc633e1f01c7cc941fad26fa
-
SHA1
27f41803c21809097f7d60c2d47a373af44c2df6
-
SHA256
1bfecd956edf85412a0e7b3a38a29a55960da52f3b8a84b2477b670de755784c
-
SHA512
4438e2ad069025b79ce4a847f04961d19780f600d8247176d02beaffb1fb42178f839a968295924aeb9a4212c482e4c64ea35259d9c4f7cd55cac233113a35a4
-
SSDEEP
6144:52c9Y0Bw3O85ixxumSiG+Nxm5/1DPwFhPSP:Ec9Y0B8O8wxYBoq/NojSP
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\help\EB6C4499B05F.dll 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe File opened for modification C:\Windows\help\EB6C4499B05F.dll 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765} 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\ = "SSUUDL" 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32\ = "C:\\Windows\\help\\EB6C4499B05F.dll" 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32\ThreadingModel = "Apartment" 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeBackupPrivilege 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Token: SeRestorePrivilege 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Token: SeRestorePrivilege 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Token: SeRestorePrivilege 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Token: SeRestorePrivilege 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Token: SeRestorePrivilege 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Token: SeBackupPrivilege 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Token: SeRestorePrivilege 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Token: SeRestorePrivilege 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Token: SeRestorePrivilege 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Token: SeRestorePrivilege 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe Token: SeRestorePrivilege 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2796 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2796 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2796 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2796 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2120 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe 32 PID 2692 wrote to memory of 2120 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe 32 PID 2692 wrote to memory of 2120 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe 32 PID 2692 wrote to memory of 2120 2692 347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\347514c3fc633e1f01c7cc941fad26fa_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵PID:2796
-
-
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵PID:2120
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD5084391877619ba70f8c0c32a284e2860
SHA17d3c1227a9fd8acb763049142443152a4f9748bb
SHA25611aded5764c570597c697f3f655f9a80420268cbf01876b8a937a54b4f640aa4
SHA512712bc4715602fa460905ad16b02ca3af20db3a5f7132356d6753f947bddd607305350ccf26c7899f2e158a8d5963805eff1a9574d0ca58336605977d43c8a2a4
-
Filesize
63B
MD51b7baeb128f11d70a51ee5452e523c2a
SHA16c161f13a825ea67638d3191095745d8fa8a9761
SHA2568f3340c3bb8b1ad6ab31bc03c4a7a0b4df09ade20ec5d529d930a17a8ba159c3
SHA512a1ecbc820258e4b7e0d23b1980d38104649351a77a6925711e86c8cd5d53491626d927afa4a4826a9b47996b93cfc0b79f73427c4ada746020293b4fe3ce3100
-
Filesize
132KB
MD5da29e67a79b185913945dd8cf40f22f1
SHA16cfd2701dd1e11a2efa2a37b060cacc185576507
SHA2561b89fd9f273158ea92ec727b3d7492c007746dd55f2a9024955ecff67b8bfd27
SHA51200b4258022199a1facfa4a6aa6aea910259c6adb9f968126b7a9243925f5023b8ae7579b6ec3a292238f882b52a9748a8b2125ce132eb958e0fa0758a107d5db