Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe
-
Size
742KB
-
MD5
3b44e831ee4573d532e85b0251600383
-
SHA1
1778713d0fb78dc2de530516b09e74454beb12af
-
SHA256
bfde7fa0e690f0c905c26e14a692ebe8bec7df99c66c2b652c3d871296063306
-
SHA512
a51d04ce28f39c4bce69d4223742258dc2596862bee42a08fba2eae0aa197f26dd8002e126de147806d90015f8b1f57bb98772a4d645092b485d20f8d43581d8
-
SSDEEP
12288:WRyLSFkU4u/n/tcEW5A0zyzvJwQ5oAlK+G6wvYhIk6bQQ52LuRg08jjVyZzZ:iKNU4ufeEW5A22Jr/kowvyIk6Bm0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2500 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1464 system32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1464 set thread context of 884 1464 system32.exe 31 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\system32.exe 3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe File opened for modification C:\Windows\system32.exe 3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe File created C:\Windows\uninstal.bat 3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2440 3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe Token: SeDebugPrivilege 1464 system32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1464 wrote to memory of 884 1464 system32.exe 31 PID 1464 wrote to memory of 884 1464 system32.exe 31 PID 1464 wrote to memory of 884 1464 system32.exe 31 PID 1464 wrote to memory of 884 1464 system32.exe 31 PID 1464 wrote to memory of 884 1464 system32.exe 31 PID 1464 wrote to memory of 884 1464 system32.exe 31 PID 2440 wrote to memory of 2500 2440 3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe 32 PID 2440 wrote to memory of 2500 2440 3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe 32 PID 2440 wrote to memory of 2500 2440 3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe 32 PID 2440 wrote to memory of 2500 2440 3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe 32 PID 2440 wrote to memory of 2500 2440 3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe 32 PID 2440 wrote to memory of 2500 2440 3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe 32 PID 2440 wrote to memory of 2500 2440 3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b44e831ee4573d532e85b0251600383_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
PID:2500
-
-
C:\Windows\system32.exeC:\Windows\system32.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\WINDOWS\SysWOW64\svchost.exeC:\WINDOWS\system32\svchost.exe2⤵PID:884
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
742KB
MD53b44e831ee4573d532e85b0251600383
SHA11778713d0fb78dc2de530516b09e74454beb12af
SHA256bfde7fa0e690f0c905c26e14a692ebe8bec7df99c66c2b652c3d871296063306
SHA512a51d04ce28f39c4bce69d4223742258dc2596862bee42a08fba2eae0aa197f26dd8002e126de147806d90015f8b1f57bb98772a4d645092b485d20f8d43581d8
-
Filesize
218B
MD5878549a3a3b65e162a67d1c2b4546167
SHA1b9a0f6ef88800fe23cf91f9782e7ca4cb5089639
SHA256b76ada053d3745892de6c13a2270e74fdb5fe62ffb7a6e2a46c021dc676fe539
SHA512ad204ec30e3e2c889555a87954a21d0b15aecdde13c30c9db53201e8278e5e1c35c2d39fe43a8bdc0dbea05475772f26f914d280f1d3e34cea974ba2add25dbe