Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
4bbf46126d9abe2edd4d2ca59316f7ee_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4bbf46126d9abe2edd4d2ca59316f7ee_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4bbf46126d9abe2edd4d2ca59316f7ee_JaffaCakes118.exe
-
Size
356KB
-
MD5
4bbf46126d9abe2edd4d2ca59316f7ee
-
SHA1
df3a0d3f52cf95a4207216a1ca5b1f61c0ee3c86
-
SHA256
0c1470cd75cebc74c2b9df3dfb6b80ea23470032652ef3d8cde983939037db95
-
SHA512
861ae75ab23b570e12edbfb5f2494b35ee78d14ec6110f067e4ec43681aba664eab2eeedbecbe3454db1bcac46b8f6a324a850acb406c0fe053fd115bd8da3eb
-
SSDEEP
6144:utx9duyNdNILgM2u+nmzK6QgSuHL5vj6pNqAxrcxnE1CQcYI8+yXObxKqG9FP:ut5j/IEGpzK6FSkFvbAeF0CxYgdbiP
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rsaauto.bak 4bbf46126d9abe2edd4d2ca59316f7ee_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\systom32\ 4bbf46126d9abe2edd4d2ca59316f7ee_JaffaCakes118.exe File created C:\Windows\systom32\svchost.exe 4bbf46126d9abe2edd4d2ca59316f7ee_JaffaCakes118.exe File opened for modification C:\Windows\systom32\svchost.exe 4bbf46126d9abe2edd4d2ca59316f7ee_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeRestorePrivilege 1188 4bbf46126d9abe2edd4d2ca59316f7ee_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1188 wrote to memory of 3056 1188 4bbf46126d9abe2edd4d2ca59316f7ee_JaffaCakes118.exe 84 PID 1188 wrote to memory of 3056 1188 4bbf46126d9abe2edd4d2ca59316f7ee_JaffaCakes118.exe 84 PID 1188 wrote to memory of 3056 1188 4bbf46126d9abe2edd4d2ca59316f7ee_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bbf46126d9abe2edd4d2ca59316f7ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4bbf46126d9abe2edd4d2ca59316f7ee_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c afc9fe2f418b00a0.bat2⤵PID:3056
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52b66ccaf5e536eec8abb89f5930d1941
SHA157c22e6eb537471f1a0c6133c94aeca39f04772b
SHA256e6c3e0c193c8b017ec0855428a31073cafdfa9fe1bcf11fd3b5b5506a837351f
SHA51222de4ffc1994ebede9a407f3f8c2e21519dd506869ae89f36bcddeedcf5c9c9889f91b6245b3380c50c5cadeb79fa212f95b9d98ce2c3a23d703cb232908b76c