Analysis
-
max time kernel
142s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 09:42
Behavioral task
behavioral1
Sample
4547a8c15b1813e6d8c3f740a55c267f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4547a8c15b1813e6d8c3f740a55c267f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4547a8c15b1813e6d8c3f740a55c267f_JaffaCakes118.exe
-
Size
448KB
-
MD5
4547a8c15b1813e6d8c3f740a55c267f
-
SHA1
9fe2a432695894b62dfe0562fe50509a1892ce60
-
SHA256
b28d08621ebdeeaaf01bcd16ad1c6d74502ade3be812736abd93363af786f92b
-
SHA512
385a9b10235d8e6006319ba056a62ebfa2e837938e25bf2ecefc9502a19c64a58160b2f1a963da92960b551ff617f5f14f0a2f1739fe4e128056b606d97225c2
-
SSDEEP
12288:o18tQncSV1jOMBTKvZA7hoqFLLUeG9YAcEN:o1DnbjymO/qJg9nN
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000c000000023452-85.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1048 EntSver.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\EntSver.exe 4547a8c15b1813e6d8c3f740a55c267f_JaffaCakes118.exe File opened for modification C:\Windows\EntSver.exe 4547a8c15b1813e6d8c3f740a55c267f_JaffaCakes118.exe File created C:\Windows\GUOCYOKl.BAT 4547a8c15b1813e6d8c3f740a55c267f_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1788 4848 WerFault.exe 82 3232 1048 WerFault.exe 89 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4848 4547a8c15b1813e6d8c3f740a55c267f_JaffaCakes118.exe Token: SeDebugPrivilege 1048 EntSver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1048 EntSver.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1048 wrote to memory of 4712 1048 EntSver.exe 92 PID 1048 wrote to memory of 4712 1048 EntSver.exe 92 PID 4848 wrote to memory of 756 4848 4547a8c15b1813e6d8c3f740a55c267f_JaffaCakes118.exe 93 PID 4848 wrote to memory of 756 4848 4547a8c15b1813e6d8c3f740a55c267f_JaffaCakes118.exe 93 PID 4848 wrote to memory of 756 4848 4547a8c15b1813e6d8c3f740a55c267f_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\4547a8c15b1813e6d8c3f740a55c267f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4547a8c15b1813e6d8c3f740a55c267f_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 5162⤵
- Program crash
PID:1788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\GUOCYOKl.BAT2⤵PID:756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4848 -ip 48481⤵PID:4376
-
C:\Windows\EntSver.exeC:\Windows\EntSver.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 5162⤵
- Program crash
PID:3232
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1048 -ip 10481⤵PID:4172
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD54547a8c15b1813e6d8c3f740a55c267f
SHA19fe2a432695894b62dfe0562fe50509a1892ce60
SHA256b28d08621ebdeeaaf01bcd16ad1c6d74502ade3be812736abd93363af786f92b
SHA512385a9b10235d8e6006319ba056a62ebfa2e837938e25bf2ecefc9502a19c64a58160b2f1a963da92960b551ff617f5f14f0a2f1739fe4e128056b606d97225c2
-
Filesize
218B
MD535b2c46ec341217ac68a9e2e760c9c04
SHA10abf2a1922e421d25111a53adf8e2f9941fec276
SHA2564537f8fe4acbf6540e2dfe810789567510d480289050a93e20585797baf8530d
SHA5126729783e3b431518321777d599c07a57128a6229f61241b19b6606d05d1d58390ecbc4f83cf1e384ba1fc83290a2f31570160563ce877b303bebeca35bbf6f38