Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 00:34
Behavioral task
behavioral1
Sample
4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe
Resource
win7-20240705-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe
Resource
win10v2004-20240709-en
8 signatures
150 seconds
General
-
Target
4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe
-
Size
39KB
-
MD5
4775a25c5c3ce0bf858208c9af616c80
-
SHA1
71bcafaf55dff2b5d69b36a69d3858f742b9d028
-
SHA256
00d69c89ab209265413134b2a67a37d7f3b9bf9a1655e08778dfdcba07009f14
-
SHA512
0f13851525731f9a06993f627487a12a5db67944d9c8a71401cde303ac249e98f3c32f5438500b442153cfdddc69f334239068e17a7aef687c5b07defed01fa1
-
SSDEEP
768:XV4nYirIVEYEE7CMiVBUmpibSRvqF9i5Ht6ukWRUjvkIFwz:FsYgIVP7diVBUBtikfWwkPz
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2344-0-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2344-5-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2344-6-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\DvdPlayer.exe 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\DvdPlayer.exe 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe -
Kills process with taskkill 2 IoCs
pid Process 1328 taskkill.exe 3264 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings rundll32.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSystemtimePrivilege 2344 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe Token: SeDebugPrivilege 3264 taskkill.exe Token: SeDebugPrivilege 1328 taskkill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2344 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1100 2344 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe 83 PID 2344 wrote to memory of 1100 2344 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe 83 PID 2344 wrote to memory of 1100 2344 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe 83 PID 2344 wrote to memory of 1328 2344 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe 84 PID 2344 wrote to memory of 1328 2344 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe 84 PID 2344 wrote to memory of 1328 2344 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe 84 PID 2344 wrote to memory of 3264 2344 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe 85 PID 2344 wrote to memory of 3264 2344 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe 85 PID 2344 wrote to memory of 3264 2344 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe 85 PID 2344 wrote to memory of 740 2344 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe 86 PID 2344 wrote to memory of 740 2344 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe 86 PID 2344 wrote to memory of 740 2344 4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe 86 PID 1100 wrote to memory of 2700 1100 net.exe 93 PID 1100 wrote to memory of 2700 1100 net.exe 93 PID 1100 wrote to memory of 2700 1100 net.exe 93 PID 740 wrote to memory of 2712 740 net.exe 94 PID 740 wrote to memory of 2712 740 net.exe 94 PID 740 wrote to memory of 2712 740 net.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\net.exenet stop "Norton Antivirus Auto Protect Service"2⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Norton Antivirus Auto Protect Service"3⤵PID:2700
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im NOD32KRN.EXE2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im NOD32KUI.EXE2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
C:\Windows\SysWOW64\net.exenet stop "mcshield"2⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mcshield"3⤵PID:2712
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\FirewallControlPanel.dll,ShowWarningDialog "C:\Users\Admin\AppData\Local\Temp\4775a25c5c3ce0bf858208c9af616c80_JaffaCakes118.exe"1⤵
- Modifies registry class
PID:3244