Analysis
-
max time kernel
142s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 21:10
Static task
static1
Behavioral task
behavioral1
Sample
3665740f0ac73da74eeb707a496866b4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3665740f0ac73da74eeb707a496866b4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3665740f0ac73da74eeb707a496866b4_JaffaCakes118.exe
-
Size
630KB
-
MD5
3665740f0ac73da74eeb707a496866b4
-
SHA1
dea9eb4067800e4789730563ff92152148552e76
-
SHA256
eb7b428633e1261c96af3569b2de0ad9d81c34d14048721ba6f18743e5700fab
-
SHA512
29c9aba7b7febb983603190233fce1e631242df59b9d5287d127bd6cb9b0ead85228fcbd31e148683fcabbfa26760eb5da4052220d2a038ba387901c5d450ff7
-
SSDEEP
12288:pPJRDTkGVGUlqmKir+isGxP5i1zF3Z4mxx30MHoTAFbiZg:rRDQyG99iSGxP5i9QmX3KZC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Hacker.com.cn.exepid process 2792 Hacker.com.cn.exe -
Drops file in Windows directory 2 IoCs
Processes:
3665740f0ac73da74eeb707a496866b4_JaffaCakes118.exedescription ioc process File created C:\Windows\Hacker.com.cn.exe 3665740f0ac73da74eeb707a496866b4_JaffaCakes118.exe File opened for modification C:\Windows\Hacker.com.cn.exe 3665740f0ac73da74eeb707a496866b4_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3665740f0ac73da74eeb707a496866b4_JaffaCakes118.exeHacker.com.cn.exedescription pid process Token: SeDebugPrivilege 1272 3665740f0ac73da74eeb707a496866b4_JaffaCakes118.exe Token: SeDebugPrivilege 2792 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Hacker.com.cn.exepid process 2792 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Hacker.com.cn.exedescription pid process target process PID 2792 wrote to memory of 2752 2792 Hacker.com.cn.exe IEXPLORE.EXE PID 2792 wrote to memory of 2752 2792 Hacker.com.cn.exe IEXPLORE.EXE PID 2792 wrote to memory of 2752 2792 Hacker.com.cn.exe IEXPLORE.EXE PID 2792 wrote to memory of 2752 2792 Hacker.com.cn.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\3665740f0ac73da74eeb707a496866b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3665740f0ac73da74eeb707a496866b4_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2752
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
630KB
MD53665740f0ac73da74eeb707a496866b4
SHA1dea9eb4067800e4789730563ff92152148552e76
SHA256eb7b428633e1261c96af3569b2de0ad9d81c34d14048721ba6f18743e5700fab
SHA51229c9aba7b7febb983603190233fce1e631242df59b9d5287d127bd6cb9b0ead85228fcbd31e148683fcabbfa26760eb5da4052220d2a038ba387901c5d450ff7