Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
37679d8cdbdb8a18d4ecf9cf5c21f673_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
37679d8cdbdb8a18d4ecf9cf5c21f673_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37679d8cdbdb8a18d4ecf9cf5c21f673_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
37679d8cdbdb8a18d4ecf9cf5c21f673
-
SHA1
eb46e6a6c4779c402be327e8bbd684cf945d9542
-
SHA256
d2222167a4feca9d5c07f981d82f8af18edb26c38abf6c17ae4f37cf769dacc4
-
SHA512
c98123237c12eff8f61a23940b49c59b7a07318237f60254c91d1155e6f3b4d1692e2161b3e0e7555bdad5a65225b52c062a29574c5929cc5c82103e6460707f
-
SSDEEP
24576:agAUadtlC7qogDYWbYp4L8hZ12JPk4djP7mAHrcrCFgx:agAzdt47BphCfrUCFgx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4820 ~ -
Use of msiexec (install) with remote resource 1 IoCs
pid Process 3968 MSIEXEC.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3476 set thread context of 4820 3476 37679d8cdbdb8a18d4ecf9cf5c21f673_JaffaCakes118.exe 84 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3968 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 3968 MSIEXEC.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3968 MSIEXEC.EXE 3968 MSIEXEC.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3476 wrote to memory of 4820 3476 37679d8cdbdb8a18d4ecf9cf5c21f673_JaffaCakes118.exe 84 PID 3476 wrote to memory of 4820 3476 37679d8cdbdb8a18d4ecf9cf5c21f673_JaffaCakes118.exe 84 PID 3476 wrote to memory of 4820 3476 37679d8cdbdb8a18d4ecf9cf5c21f673_JaffaCakes118.exe 84 PID 3476 wrote to memory of 4820 3476 37679d8cdbdb8a18d4ecf9cf5c21f673_JaffaCakes118.exe 84 PID 3476 wrote to memory of 4820 3476 37679d8cdbdb8a18d4ecf9cf5c21f673_JaffaCakes118.exe 84 PID 4820 wrote to memory of 3968 4820 ~ 87 PID 4820 wrote to memory of 3968 4820 ~ 87 PID 4820 wrote to memory of 3968 4820 ~ 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\37679d8cdbdb8a18d4ecf9cf5c21f673_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37679d8cdbdb8a18d4ecf9cf5c21f673_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\~C:\Users\Admin\AppData\Local\Temp\~2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\MSIEXEC.EXEMSIEXEC.EXE /i "http://setup.realtimegaming.com/36175/cdn/jackpotcapital/Jackpot Capital20110124081049.msi" DDC_DID=609502 DDC_RTGURL=http://www.dlsetup.com/dl/TrackSetup/TrackSetup.aspx?DID=609502 SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="~"3⤵
- Use of msiexec (install) with remote resource
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3968
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD536affbd6ff77d1515cfc1c5e998fbaf9
SHA1950d00ecc2e7fd2c48897814029e8eedf6397838
SHA256fccc7f79d29318d8ae78850c262bac762c28858709a6e6cf3b62bcd2729a61e3
SHA5122f29de86d486db783872581a43a834e5064d1488bc3f085ddc5a3287eb9ee8a4ce93d66f7b4965cafb3c4f06b38d4b0fcfdc0fcb1f99d61331a808e5d6011808
-
Filesize
20B
MD5db9af7503f195df96593ac42d5519075
SHA11b487531bad10f77750b8a50aca48593379e5f56
SHA2560a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13
SHA5126839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b
-
Filesize
904KB
MD55f705ef533a3271ad14c3755cd5da0fb
SHA1260ca4db939017cb44993fdf9da705c092ff4d8b
SHA256803297b6508e7fd48479c56199ae3cb6823c4c90fcc88cadfab460cf79749387
SHA512708d9d7e8e5bc9db5deec75d41aec400ff399f75bb9bc9e240ef53b8221fd2b8601f4f12556f0f131a9a5ac0c61ed2950f12bb9d58d94eeadeb055a87ae1320e
-
Filesize
5KB
MD523e40a3344b5548ef4000483eca05da7
SHA1d5e475813146ee9b94c8a1a433715ca28f241ad0
SHA2569fcefe4afec4e13a8cc06c121c9fb97fb9a0d03c719cdda956fa6397acd4ad22
SHA512105c535335827debc30bb1db92f3a5ffd7361d28dfe432ba435f14983a596e252aa3536ad4e6963df321fa655d485754c28767944b1b604452bf247caad50c23