Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 03:53
Behavioral task
behavioral1
Sample
481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe
-
Size
60KB
-
MD5
481b3bd6ebdf8ad363b072cd9d04c207
-
SHA1
139d2dc679914ff6758f677964de419dd41d0c89
-
SHA256
d5f7c6d8f487c4bb5bb928345384f5e2450f1f2fed6f836a321ed0e0a0b1e494
-
SHA512
28d888b18bdc82446d63542319b79597bbae4cfc4b86e73bcf13904766cdceb1f3d1b3b7f545ab5308d33ddbc7f531708288ed840655a17977381b26c3787dc1
-
SSDEEP
1536:ONwGc2yJP5qmzeVGZ/k3gWrHoTHnvGCr3EbgYNIb:KwGBkP5lA6c3gMHcvBggYNIb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2720 clipbrd3d.exe -
Executes dropped EXE 2 IoCs
pid Process 2720 clipbrd3d.exe 2604 clipbrd3d.exe -
Loads dropped DLL 3 IoCs
pid Process 2844 481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe 2844 481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe 2604 clipbrd3d.exe -
resource yara_rule behavioral1/memory/2844-14-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/files/0x0008000000015d73-8.dat upx behavioral1/memory/2720-18-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2604-38-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2844-40-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2604-43-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2720-44-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\clipbrd3d.dll clipbrd3d.exe File opened for modification C:\Windows\SysWOW64\clipbrd3d.dat 481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\clipbrd3d.dll clipbrd3d.exe File opened for modification C:\Windows\SysWOW64\clipbrd3d.dll 481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe File created C:\Windows\SysWOW64\clipbrd3d.dll 481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\clipbrd3d.exe 481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe File created C:\Windows\SysWOW64\clipbrd3d.exe 481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2604 clipbrd3d.exe 2604 clipbrd3d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2604 clipbrd3d.exe Token: SeDebugPrivilege 2604 clipbrd3d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2720 2844 481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2720 2844 481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2720 2844 481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2720 2844 481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\clipbrd3d.exeC:\Windows\system32\clipbrd3d.exe -d C:\Users\Admin\AppData\Local\Temp\481b3bd6ebdf8ad363b072cd9d04c207_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
PID:2720
-
-
C:\Windows\SysWOW64\clipbrd3d.exeC:\Windows\SysWOW64\clipbrd3d.exe -v1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
845B
MD5bd514f067b02243ed4f9afef7ffc8b7c
SHA157df893f5ffa35e94398589ca2b42ed89d5f73e5
SHA256d615c870bf3b22ee2d3548ef255db62b95ad2961cf0da073f60f931fad16b8de
SHA51228072bec8432f5db37091fd313a8fdaeb07782eacae57e8af8d424f734f5ee5d4ac8b47ba8d012e1c270573ade589515fa761a56574944ffd76b14c7110741ec
-
Filesize
108KB
MD5fdbefdd7d00997c84f84e3da6138ee21
SHA1e20172ee86f3dcea06871a427cf14773cb0de3c5
SHA256e4f1a7149147257c2b2fb5088512f3da7f4827ec1a6d8264746002fe87603d67
SHA51280a9482474f159bb5fdc82015980bc38ed941dedaffdc4348feef628af15c9bc2116ea5f30aaafdd351f8ed9f8a5a8557bb9528efa9740b6126edd57a695ef04
-
Filesize
60KB
MD5481b3bd6ebdf8ad363b072cd9d04c207
SHA1139d2dc679914ff6758f677964de419dd41d0c89
SHA256d5f7c6d8f487c4bb5bb928345384f5e2450f1f2fed6f836a321ed0e0a0b1e494
SHA51228d888b18bdc82446d63542319b79597bbae4cfc4b86e73bcf13904766cdceb1f3d1b3b7f545ab5308d33ddbc7f531708288ed840655a17977381b26c3787dc1