Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe
-
Size
89KB
-
MD5
47b92870ffa733a8da933cd634f90db9
-
SHA1
7350552be26798ddf530ebae862fce7f72e869ae
-
SHA256
2d840205c5e6898a9ddcd306890c62d25b2018185ce0bb496c2cdc0fc90f3733
-
SHA512
34175002082bafa39691276982d2c1febdcab57cf70ced837ae095caf9015a3a930c027c848ee606a3d5aa4e7e51de31d86a506f94bb5f88c7ed5d4e4a0cb3ea
-
SSDEEP
1536:k5GJEhlcbW5sk1BlfLvveIbXWm+nwN6Jsos5gz87raiWQpyvH9JaT9MtXFAK0:yGu9BlfzWIbXWm+w0JM5o87rJuHqhMtO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2488 S0M_SC~1.EXE -
Loads dropped DLL 3 IoCs
pid Process 1760 47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe 1760 47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe 2488 S0M_SC~1.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 2488 S0M_SC~1.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2488 1760 47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2488 1760 47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2488 1760 47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2488 1760 47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2488 1760 47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2488 1760 47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2488 1760 47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\47b92870ffa733a8da933cd634f90db9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\S0M_SC~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\S0M_SC~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD53feac6cb4277e2b579218db9306e13e9
SHA14cad7a86815e6da15d8e12e4b9600824603a0978
SHA2569cffb1b425b7b60e2b97f7357c0678091269dcd8e54d9671cca5847ec1cb8735
SHA5121ef12c898731f961fa2f2f1e02d2b8af1cddb3c2df6791158475f090a787214c382355501c0fb79e9506dae0dfdf86fb26f696a45b8bf074c6428ead528f8348