Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 13:38
Behavioral task
behavioral1
Sample
3959b35ed31572651607d234f10a4d63_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3959b35ed31572651607d234f10a4d63_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3959b35ed31572651607d234f10a4d63_JaffaCakes118.exe
-
Size
52KB
-
MD5
3959b35ed31572651607d234f10a4d63
-
SHA1
bf7e1d08ebfc8cc2a36cfa1e9fde42d5be26671d
-
SHA256
26f955209414728ddb94194f0de91680ae49054a1870a24c2fbc64a899d20981
-
SHA512
56f2f221991eb8261441ebc41ab8cb5e7168e0e2e27ef73abe71ec63377798c63235b7b8562094a8aca1fe1be08e30e63617bbe930f2a2eaa7f8ac410db14125
-
SSDEEP
1536:QEybaQJNZtbYlabHAbQSYCNUGHqCnouy8xS:QHaQJj28whVPoutE
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibilityex.dll" 3959b35ed31572651607d234f10a4d63_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2680 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2112 3959b35ed31572651607d234f10a4d63_JaffaCakes118.exe 2680 svchost.exe -
resource yara_rule behavioral1/memory/2112-4-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2112-15-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2112 3959b35ed31572651607d234f10a4d63_JaffaCakes118.exe Token: SeDebugPrivilege 2680 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2680 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3959b35ed31572651607d234f10a4d63_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3959b35ed31572651607d234f10a4d63_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5fb0dfcccc4a2fd66817e8db6beb688e3
SHA194996d6d3dbda5f11d3e67238433ab77e78bfb18
SHA2561a0d51d6b063363d0eac18b97871c03f27538be3ee0be3f98cb64a091afd2189
SHA512da676852d5720894f60ff8b00affedc2221cb011ef4ae429dc48d6299c1a3915b7acd250bcafd6e499d56d67c182b90070b373056e6cffaf94c6afcbaf6f4b9a