Analysis
-
max time kernel
141s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe
-
Size
175KB
-
MD5
3ed2f2b13b855cf6e6909d09bcdfb930
-
SHA1
7a89eb6be366fa15bc94ef7e43d1dc41d01a3b47
-
SHA256
e706a27c8befbc22029aa2f33c5f8c51be52a42c05cdf414d06633e6ae153c6a
-
SHA512
3a50266edb850f264a05d4dcd1b65839e3f9ff4c4948a519081765f67f9c25959405226fb3d6236b5f5cce464078ef1a5b9aa0fbd3cc3e505c505bca85a23364
-
SSDEEP
3072:LXpnGI9NAlzZsAKEJgf4U3r9Ui9NuOVCSEAOlfPTsrcbEv2NmDxylGdkS50B4:LZ99NAltsAKEjUJUiLuOVPOlfPwhvym2
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\VMware, Inc.\VMware Tools 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2124 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\cooper.mine 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe File created C:\Windows\SysWOW64\nmklo.dll 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\user32.dll 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe File created C:\Windows\SysWOW64\h7t.wt 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe File created C:\Windows\SysWOW64\ff4h.gy 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe File created C:\Windows\SysWOW64\hgtd.ruy 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cooper.mine 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe File created C:\Windows\SysWOW64\mmmmmmmm 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe File created C:\Windows\SysWOW64\user32.DLL 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2124 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2124 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe Token: SeDebugPrivilege 2124 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2832 WMIC.exe Token: SeSecurityPrivilege 2832 WMIC.exe Token: SeTakeOwnershipPrivilege 2832 WMIC.exe Token: SeLoadDriverPrivilege 2832 WMIC.exe Token: SeSystemProfilePrivilege 2832 WMIC.exe Token: SeSystemtimePrivilege 2832 WMIC.exe Token: SeProfSingleProcessPrivilege 2832 WMIC.exe Token: SeIncBasePriorityPrivilege 2832 WMIC.exe Token: SeCreatePagefilePrivilege 2832 WMIC.exe Token: SeBackupPrivilege 2832 WMIC.exe Token: SeRestorePrivilege 2832 WMIC.exe Token: SeShutdownPrivilege 2832 WMIC.exe Token: SeDebugPrivilege 2832 WMIC.exe Token: SeSystemEnvironmentPrivilege 2832 WMIC.exe Token: SeRemoteShutdownPrivilege 2832 WMIC.exe Token: SeUndockPrivilege 2832 WMIC.exe Token: SeManageVolumePrivilege 2832 WMIC.exe Token: 33 2832 WMIC.exe Token: 34 2832 WMIC.exe Token: 35 2832 WMIC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2124 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2832 2124 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe 29 PID 2124 wrote to memory of 2832 2124 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe 29 PID 2124 wrote to memory of 2832 2124 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe 29 PID 2124 wrote to memory of 2832 2124 3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ed2f2b13b855cf6e6909d09bcdfb930_JaffaCakes118.exe"1⤵
- Looks for VMWare Tools registry key
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" path win32_terminalservicesetting where (__Class!="") call setallowtsconnections 12⤵
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5a9b0b073a2c66b115af1dd1fc26b60a5
SHA19e2d667967db9041d364328304fd2bd45bf34d65
SHA256f690f1b7ec48eebfb1f56a810abb33ccb92b3bae07ecd1f82bdf462df5a8d424
SHA5126ef365118312b21e1067bfc99078b900068be6a6217a3d5dc6b750e87e0d0efcf324723a17c11816e6e15ec77b855d491278de72bef4fee180fe599649eaec04