Analysis
-
max time kernel
1s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
44baf5bf658ee980f2f91a520af57746_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
44baf5bf658ee980f2f91a520af57746_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
44baf5bf658ee980f2f91a520af57746_JaffaCakes118.exe
-
Size
614KB
-
MD5
44baf5bf658ee980f2f91a520af57746
-
SHA1
948a21f1de5fa1f623a23d88ebe8ea9356e2e6e4
-
SHA256
68abde9904a0d248456ca7644feb157878d428be22f1fe3b8d0f91bc5f31354d
-
SHA512
8c8d746dcd1982d89ab7590c6191816fbed14192cb9252a4b575819a493cb738653d18b1c31f9f8c8f5010aea11f8540dd30f34e479cef24a840a8d5a601ef10
-
SSDEEP
12288:EXcTdgxNGaIN6hStgj4wFYGq6+wnj13vBQ/iOR/8L5wMHn374:NduNJIIgLEYyFj13vBoEVwMHk
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2672-639-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2672-645-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 284 timeout.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2084 44baf5bf658ee980f2f91a520af57746_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2084 44baf5bf658ee980f2f91a520af57746_JaffaCakes118.exe Token: 33 2084 44baf5bf658ee980f2f91a520af57746_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2084 44baf5bf658ee980f2f91a520af57746_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44baf5bf658ee980f2f91a520af57746_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\44baf5bf658ee980f2f91a520af57746_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2084 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\Project1\1.00\1432.05.03T16.34\Virtual\STUBEXE\@APPDATALOCAL@\Temp\ocx33.exe"C:\Users\Admin\AppData\Local\Temp\ocx33.exe"2⤵PID:3000
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\Project1\1.00\1432.05.03T16.34\Virtual\STUBEXE\@APPDATALOCAL@\Temp\ocx33.exe"C:\Users\Admin\AppData\Local\Temp\ocx33.exe"3⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\Project1\1.00\1432.05.03T16.34\Virtual\STUBEXE\@APPDATALOCAL@\Temp\ocx33.exe"C:\Users\Admin\AppData\Local\Temp\ocx33.exe"3⤵PID:2672
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\ocx33.exe4⤵PID:1508
-
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- Delays execution with timeout.exe
PID:284
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\Project1\1.00\1432.05.03T16.34\Virtual\STUBEXE\@APPDATALOCAL@\Temp\ocx33.exe
Filesize17KB
MD5d8e122a778026a5bb298ce78a6b4ae47
SHA122a6d92a298738883d5ee76ef0f5148bea7fb654
SHA256806cb9820f2ad756cfd147623b0f0c389b35b015d62e4a655d1662c06638cfff
SHA5125af62c6a09db3b22cc823b621ef6a5feefe00d2fdb848b60f538647c6b01a5f493c74bb9251be42a475496a9d77bf4faee9590050a12172dadb8e9382745c486