Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 09:48
Static task
static1
Behavioral task
behavioral1
Sample
3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe
-
Size
170KB
-
MD5
3ce1ae2605aa800c205ef63a45ffdbfa
-
SHA1
8b592b4413cfa168cd704d9943812ffb0b941430
-
SHA256
87742fa4d67a5d142e77dbeda2cc02bd2a975bf543ea0505045b096a82068c93
-
SHA512
25cfd395b022f1216eac7735c6dbc973e388a812a7e710296f194a3018cf40abe459b8bfcecfba652de1f73d5312ad556ac4ab5978354a919ccda15953b96cf8
-
SSDEEP
3072:8OPTvYsKQrML6dVuamswMeONJZFoC3KwHaxcFjgny86g8jXBu:8O7YENdVutswMZF5KwHaxCwy86ZBu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2140 KB01221065.exe 4312 kb01221065.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KB01221065.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\KB01221065.exe\"" kb01221065.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4580 set thread context of 2892 4580 3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe 85 PID 2140 set thread context of 4312 2140 KB01221065.exe 93 -
Program crash 2 IoCs
pid pid_target Process procid_target 3560 4580 WerFault.exe 83 2368 2140 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe 4312 kb01221065.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 4312 kb01221065.exe Token: SeSecurityPrivilege 4580 3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe Token: SeSecurityPrivilege 4460 cmd.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4580 wrote to memory of 2892 4580 3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe 85 PID 4580 wrote to memory of 2892 4580 3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe 85 PID 4580 wrote to memory of 2892 4580 3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe 85 PID 4580 wrote to memory of 2892 4580 3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe 85 PID 4580 wrote to memory of 2892 4580 3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe 85 PID 4580 wrote to memory of 2892 4580 3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe 85 PID 4580 wrote to memory of 2892 4580 3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe 85 PID 4580 wrote to memory of 2892 4580 3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe 85 PID 4580 wrote to memory of 2892 4580 3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe 85 PID 4580 wrote to memory of 2892 4580 3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe 85 PID 2892 wrote to memory of 4460 2892 3ce1ae2605aa800c205ef63a45ffdbfa_jaffacakes118.exe 89 PID 2892 wrote to memory of 4460 2892 3ce1ae2605aa800c205ef63a45ffdbfa_jaffacakes118.exe 89 PID 2892 wrote to memory of 4460 2892 3ce1ae2605aa800c205ef63a45ffdbfa_jaffacakes118.exe 89 PID 2892 wrote to memory of 2140 2892 3ce1ae2605aa800c205ef63a45ffdbfa_jaffacakes118.exe 90 PID 2892 wrote to memory of 2140 2892 3ce1ae2605aa800c205ef63a45ffdbfa_jaffacakes118.exe 90 PID 2892 wrote to memory of 2140 2892 3ce1ae2605aa800c205ef63a45ffdbfa_jaffacakes118.exe 90 PID 2140 wrote to memory of 4312 2140 KB01221065.exe 93 PID 2140 wrote to memory of 4312 2140 KB01221065.exe 93 PID 2140 wrote to memory of 4312 2140 KB01221065.exe 93 PID 2140 wrote to memory of 4312 2140 KB01221065.exe 93 PID 2140 wrote to memory of 4312 2140 KB01221065.exe 93 PID 2140 wrote to memory of 4312 2140 KB01221065.exe 93 PID 2140 wrote to memory of 4312 2140 KB01221065.exe 93 PID 2140 wrote to memory of 4312 2140 KB01221065.exe 93 PID 2140 wrote to memory of 4312 2140 KB01221065.exe 93 PID 2140 wrote to memory of 4312 2140 KB01221065.exe 93 PID 4312 wrote to memory of 4580 4312 kb01221065.exe 83 PID 4312 wrote to memory of 4460 4312 kb01221065.exe 89 PID 4312 wrote to memory of 3560 4312 kb01221065.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4580 -
\??\c:\users\admin\appdata\local\temp\3ce1ae2605aa800c205ef63a45ffdbfa_jaffacakes118.exe"c:\users\admin\appdata\local\temp\3ce1ae2605aa800c205ef63a45ffdbfa_jaffacakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\expB333.tmp.bat"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Users\Admin\AppData\Roaming\KB01221065.exe"C:\Users\Admin\AppData\Roaming\KB01221065.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2140 -
\??\c:\users\admin\appdata\roaming\kb01221065.exe"c:\users\admin\appdata\roaming\kb01221065.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 4564⤵
- Program crash
PID:2368
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 4442⤵
- Program crash
PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4580 -ip 45801⤵PID:1376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2140 -ip 21401⤵PID:4508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286B
MD5b33de23835e2fac18013ebd253d18436
SHA17480e18d2186670309a003b51adc16a23be791e5
SHA25602ef6ed76b2104696a948ebad2456b7bfa1276b40412803783fb9c67923de5b0
SHA5125bce9b1e6e1b54cdf80e3ee601fc5959bd8d791d159f2b15e60e497e12a1edd23b324b5d789349cd05940bdc18fe003e806a987a57b053bbccd9538899624b2a
-
Filesize
170KB
MD53ce1ae2605aa800c205ef63a45ffdbfa
SHA18b592b4413cfa168cd704d9943812ffb0b941430
SHA25687742fa4d67a5d142e77dbeda2cc02bd2a975bf543ea0505045b096a82068c93
SHA51225cfd395b022f1216eac7735c6dbc973e388a812a7e710296f194a3018cf40abe459b8bfcecfba652de1f73d5312ad556ac4ab5978354a919ccda15953b96cf8