Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
3816db836ab20149960a1339bf24a8db_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3816db836ab20149960a1339bf24a8db_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3816db836ab20149960a1339bf24a8db_JaffaCakes118.exe
-
Size
2.8MB
-
MD5
3816db836ab20149960a1339bf24a8db
-
SHA1
dab987238f2030eb9d718d77ff44244c0910ceb2
-
SHA256
f58f38923b89ed655093590e7bb2f0a23d5bb274b5cae3f84c4eda72856eda07
-
SHA512
7bf5c4599276d29937752d19fe5144a726c123c95b977342b3470f726f316bbbe786303a4f0578867c3745038acc49a4ede53f3b9d09aad0bbd4963095835613
-
SSDEEP
49152:3MC705bpqp7uVB+st06ZV3LdUBvoku6X4JQrMi8icjbpWJTkTla5DGPd4:NYpqA+stLXGHu6X4IwnpWWla5Kl4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2820 Server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3816db836ab20149960a1339bf24a8db_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe 2820 Server.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2820 Server.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 540 wrote to memory of 2820 540 3816db836ab20149960a1339bf24a8db_JaffaCakes118.exe 83 PID 540 wrote to memory of 2820 540 3816db836ab20149960a1339bf24a8db_JaffaCakes118.exe 83 PID 540 wrote to memory of 2820 540 3816db836ab20149960a1339bf24a8db_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\3816db836ab20149960a1339bf24a8db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3816db836ab20149960a1339bf24a8db_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Server.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD5e5fcb356f29a9668484ea3ea0a50f97c
SHA121c25e7cb2a017a82d16794819e073b36bb3a96b
SHA2560e9dbf6981aa144556eba8cca1436541ba77c09af57fc51b09559fe7b4f36223
SHA512a05f0d27b0260499df7cf89537c1b960b4b7cfc66ec7d8183f85753891a55cc72790a77bbbc4fcd1e8500e0a57265cbd4bf5d83b63f53dfae2bba323cd27c3ff