Analysis
-
max time kernel
93s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe
-
Size
9KB
-
MD5
3b331741b9f58cfe23bfdedfaeecf8cc
-
SHA1
4b3640e521c19f7717de860366b06bb9fd081010
-
SHA256
8d2696e3162827cbc28f3100be33a08ffc99414fe3d28cc7b1f25344afc438af
-
SHA512
7d7c624f71c24d9c119541b5d2c72278dc260d3402601b3a2987d0c449b64d0e72d15332c6e20be77a1afd866fa8895b2a2211cd739dd84fb4ec4889d54fe77c
-
SSDEEP
192:hjnhR1bneNit+V/XJyN7AhAV+Uw08CtkgUw95/nnG:hjuK+V/27AiwUwTCCIu
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Loads dropped DLL 1 IoCs
pid Process 2400 3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinCpy.nls 3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe File created C:\Windows\SysWOW64\Inemane32.dll 3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2400 3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe 2400 3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2400 3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2400 3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe 2400 3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2400 wrote to memory of 4684 2400 3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe 86 PID 2400 wrote to memory of 4684 2400 3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe 86 PID 2400 wrote to memory of 4684 2400 3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b331741b9f58cfe23bfdedfaeecf8cc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\3B3317~1.EXE > nul2⤵PID:4684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5f4e00d1fc6f2eab33a727956f628ac9f
SHA16e620717da396b1bed12c5be62babe0c05a1573e
SHA256e3606eb4a6f1575f6f1da6fa81f3e275e752ace8e3b2f211ee29395e3c8f7a9f
SHA5122e22f3aa81e86fd8010e1f891542bb7e1a80e3530769a0602566084d67182129675a28cb528c52c970f6c8fac149ceadf8b54ecabe8fc825d95df23e9de0863a