Analysis
-
max time kernel
94s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 11:57
Static task
static1
Behavioral task
behavioral1
Sample
4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe
-
Size
99KB
-
MD5
4190d90c04beb8e166ae4cf628102336
-
SHA1
acccafbb00b1501361457cdb416b2f901bfe61c2
-
SHA256
298e20c29cb6da323943682d2ea4368ab8e1b1a590ee23559dd54ab081c99209
-
SHA512
94ad30ef8766ac80d781d4cdb5d16f0e409192f310caf016172498c087f5e57d8a08a0aa0e40eb84201cdfd99d26414e4f8969e5c7f64d26d3e485cb31f79fe0
-
SSDEEP
1536:zPpvda3b9cYBSIUF3JBug7ybH5VCC42sIQ5LG0lRTNei:TdGbWlI4FWrp/K5LG0lRTN
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jiahus = "c:\\windows\\system32\\svchqs.exe" 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\svchqs.exe 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\svchqs.exe 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2460 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe Token: SeSystemtimePrivilege 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4376 wrote to memory of 612 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 5 PID 4376 wrote to memory of 612 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 5 PID 4376 wrote to memory of 612 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 5 PID 4376 wrote to memory of 612 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 5 PID 4376 wrote to memory of 612 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 5 PID 4376 wrote to memory of 612 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 5 PID 4376 wrote to memory of 612 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 5 PID 4376 wrote to memory of 2460 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 84 PID 4376 wrote to memory of 2460 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 84 PID 4376 wrote to memory of 2460 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 84 PID 4376 wrote to memory of 2072 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 85 PID 4376 wrote to memory of 2072 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 85 PID 4376 wrote to memory of 2072 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 85 PID 4376 wrote to memory of 1548 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 86 PID 4376 wrote to memory of 1548 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 86 PID 4376 wrote to memory of 1548 4376 4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe 86 PID 2072 wrote to memory of 2404 2072 net.exe 90 PID 2072 wrote to memory of 2404 2072 net.exe 90 PID 2072 wrote to memory of 2404 2072 net.exe 90
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4190d90c04beb8e166ae4cf628102336_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto2⤵
- Launches sc.exe
PID:2460
-
-
C:\Windows\SysWOW64\net.exenet start Schedule2⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Schedule3⤵PID:2404
-
-
-
C:\Windows\SysWOW64\at.exeat 11:58 cmd /c copy "c:\users\admin\appdata\local\temp\4190d90c04beb8e166ae4cf628102336_jaffacakes118.exe" "c:\windows\system32\svchqs.exe"2⤵PID:1548
-