Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
4cafb4bc429546c2635a5786beb8c582_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4cafb4bc429546c2635a5786beb8c582_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4cafb4bc429546c2635a5786beb8c582_JaffaCakes118.exe
-
Size
438KB
-
MD5
4cafb4bc429546c2635a5786beb8c582
-
SHA1
2656d2a21592e7ccf5530d89f6f18038ad5976e6
-
SHA256
71169d83b35aeb58bf77c72e40f9515073720b76502a01cd9d7105efc976a0b6
-
SHA512
4fa45887d7e17494d6d80856399c0cb80ed1d10159a107998788151edceadf7f4c2ccec8ebc98520428badb2153707fbbfec40eb96c06289823ed2bc9aa4c673
-
SSDEEP
12288:rL/s37tD34R9gYTcsbHsyB76NtTird7HAE:rL/s3754R35B6TEd7A
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3088 unhelp.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\unhelp.exe 4cafb4bc429546c2635a5786beb8c582_JaffaCakes118.exe File opened for modification C:\Windows\unhelp.exe 4cafb4bc429546c2635a5786beb8c582_JaffaCakes118.exe File created C:\Windows\uninstal.bat 4cafb4bc429546c2635a5786beb8c582_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2548 4cafb4bc429546c2635a5786beb8c582_JaffaCakes118.exe Token: SeDebugPrivilege 3088 unhelp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3088 unhelp.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2096 2548 4cafb4bc429546c2635a5786beb8c582_JaffaCakes118.exe 88 PID 2548 wrote to memory of 2096 2548 4cafb4bc429546c2635a5786beb8c582_JaffaCakes118.exe 88 PID 2548 wrote to memory of 2096 2548 4cafb4bc429546c2635a5786beb8c582_JaffaCakes118.exe 88 PID 3088 wrote to memory of 4652 3088 unhelp.exe 87 PID 3088 wrote to memory of 4652 3088 unhelp.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cafb4bc429546c2635a5786beb8c582_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4cafb4bc429546c2635a5786beb8c582_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat2⤵PID:2096
-
-
C:\Windows\unhelp.exeC:\Windows\unhelp.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4652
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
438KB
MD54cafb4bc429546c2635a5786beb8c582
SHA12656d2a21592e7ccf5530d89f6f18038ad5976e6
SHA25671169d83b35aeb58bf77c72e40f9515073720b76502a01cd9d7105efc976a0b6
SHA5124fa45887d7e17494d6d80856399c0cb80ed1d10159a107998788151edceadf7f4c2ccec8ebc98520428badb2153707fbbfec40eb96c06289823ed2bc9aa4c673
-
Filesize
218B
MD5c2316cd1d338ea160cec04fdd3bd9aac
SHA1594826f893b8ad31389d5e076697cf946b6be515
SHA25652a9675a767b6078149895114ff7809b126857571b3bc123d97fdc39af174c9a
SHA5125a69d28e7034ba3f1a72bd6c07a0bf7ba81548a89da10c3b00f46529ebb6cb1cf8f748e3793dba933ee605af840c326ae63b7f4926d4cf1c0fec67b47fddd6ee