Analysis
-
max time kernel
34s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe
-
Size
203KB
-
MD5
3b5627311dd67f50d88752df056b24ab
-
SHA1
63fa4decb8c21fbe52328b80cd1a5172617d1678
-
SHA256
a9881176ae0cafe4e621b00ab9c35795c00d385a5a8f0c4d560adb12c7a1bf29
-
SHA512
e702ef16cb7231fb0f5ef83e2361008ed216214ff314726a8c60f28b92a03f7def93b04d171a415c20cda14569954a57aba8c451be90492fec252570ca212509
-
SSDEEP
768:BbNuitKHbNuitKQC7SEgOD+v10YxbBpptlNf4cNepClLuKicoHBLsxNNh9E9jaLm:BbtKHbtKQ22nBblNQGvlyTBAHh+2LHG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2940 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2680 QQ7BZd.exe -
Loads dropped DLL 2 IoCs
pid Process 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\System\QQ7BZd.exe 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\System\QQ7BZd.exebnb 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\System\admin.obj QQ7BZd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2924 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe Token: SeDebugPrivilege 2680 QQ7BZd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2680 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe 29 PID 1944 wrote to memory of 2680 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe 29 PID 1944 wrote to memory of 2680 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe 29 PID 1944 wrote to memory of 2680 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe 29 PID 1944 wrote to memory of 2676 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe 30 PID 1944 wrote to memory of 2676 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe 30 PID 1944 wrote to memory of 2676 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe 30 PID 1944 wrote to memory of 2676 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe 30 PID 1944 wrote to memory of 2612 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe 32 PID 1944 wrote to memory of 2612 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe 32 PID 1944 wrote to memory of 2612 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe 32 PID 1944 wrote to memory of 2612 1944 3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe 32 PID 2612 wrote to memory of 2924 2612 cmd.exe 34 PID 2612 wrote to memory of 2924 2612 cmd.exe 34 PID 2612 wrote to memory of 2924 2612 cmd.exe 34 PID 2612 wrote to memory of 2924 2612 cmd.exe 34 PID 2676 wrote to memory of 2940 2676 cmd.exe 35 PID 2676 wrote to memory of 2940 2676 cmd.exe 35 PID 2676 wrote to memory of 2940 2676 cmd.exe 35 PID 2676 wrote to memory of 2940 2676 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Common Files\System\QQ7BZd.exe"C:\Program Files (x86)\Common Files\System\QQ7BZd.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /A:RHSA "C:\Users\Admin\AppData\Local\Temp\3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe"&cmd /c del "C:\Users\Admin\AppData\Local\Temp\3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe"3⤵
- Deletes itself
PID:2940
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping -n 2 127.0.0.1>nul&del /F /Q /A : RSAH "C:\Users\Admin\AppData\Local\Temp\3b5627311dd67f50d88752df056b24ab_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203KB
MD53b5627311dd67f50d88752df056b24ab
SHA163fa4decb8c21fbe52328b80cd1a5172617d1678
SHA256a9881176ae0cafe4e621b00ab9c35795c00d385a5a8f0c4d560adb12c7a1bf29
SHA512e702ef16cb7231fb0f5ef83e2361008ed216214ff314726a8c60f28b92a03f7def93b04d171a415c20cda14569954a57aba8c451be90492fec252570ca212509