Analysis
-
max time kernel
33s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
5e1f147b3db6ad50cd49cb3abf296276_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e1f147b3db6ad50cd49cb3abf296276_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e1f147b3db6ad50cd49cb3abf296276_JaffaCakes118.exe
-
Size
47KB
-
MD5
5e1f147b3db6ad50cd49cb3abf296276
-
SHA1
22458d118511a6dfcd38de6356061a618455bfd2
-
SHA256
a5ef176cd9c199d49fb3e1b26211a60056e05fbc5f88220d71260acd7ec80f34
-
SHA512
312c240760da83633910a0948f02f6ffe77fab9bf029eafa8fbe8abe7dc96893facee170fd403bc2612c87bb4ad8e231188e9b02caa4e8028463fa2f0aa4c117
-
SSDEEP
768:WLY/rFd2NA7R0Wr/xOaN9NFYoJKVDPiVDN8MwHOrrkPNRr2fIYHwAB65YF0lpVNu:WETFdiA7ZFb5FYnRaVD8HOczqfI4XB6A
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\A8F022DB\ImagePath = "C:\\Windows\\system32\\33F6411B.EXE -A8F022DB" 5e1f147b3db6ad50cd49cb3abf296276_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2732 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3064 33F6411B.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\33F6411B.EXE 5e1f147b3db6ad50cd49cb3abf296276_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\33F6411B.EXE 5e1f147b3db6ad50cd49cb3abf296276_JaffaCakes118.exe File created C:\Windows\SysWOW64\33F6411B.EXE 33F6411B.EXE File created C:\Windows\SysWOW64\delme.bat 5e1f147b3db6ad50cd49cb3abf296276_JaffaCakes118.exe File created C:\Windows\SysWOW64\F5C00A55.DLL 33F6411B.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3064 33F6411B.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 2444 5e1f147b3db6ad50cd49cb3abf296276_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2732 2444 5e1f147b3db6ad50cd49cb3abf296276_JaffaCakes118.exe 29 PID 2444 wrote to memory of 2732 2444 5e1f147b3db6ad50cd49cb3abf296276_JaffaCakes118.exe 29 PID 2444 wrote to memory of 2732 2444 5e1f147b3db6ad50cd49cb3abf296276_JaffaCakes118.exe 29 PID 2444 wrote to memory of 2732 2444 5e1f147b3db6ad50cd49cb3abf296276_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e1f147b3db6ad50cd49cb3abf296276_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e1f147b3db6ad50cd49cb3abf296276_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\delme.bat2⤵
- Deletes itself
PID:2732
-
-
C:\Windows\SysWOW64\33F6411B.EXEC:\Windows\SysWOW64\33F6411B.EXE -A8F022DB1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD55e1f147b3db6ad50cd49cb3abf296276
SHA122458d118511a6dfcd38de6356061a618455bfd2
SHA256a5ef176cd9c199d49fb3e1b26211a60056e05fbc5f88220d71260acd7ec80f34
SHA512312c240760da83633910a0948f02f6ffe77fab9bf029eafa8fbe8abe7dc96893facee170fd403bc2612c87bb4ad8e231188e9b02caa4e8028463fa2f0aa4c117
-
Filesize
239B
MD50010f1482516d84f0102b5587670a844
SHA1483d4f76735edbf2c5dfc01c6bcb14b1ec97c2d9
SHA256f2e72a9f378cf504b0ba24ce74bd04283f22637b4c5106c5f3ab7459ed18fc87
SHA512d7f8696785d1426560d5781d29d4fcc03d06f4ecea7808cf4677b5b2f95022caab58b3cb3a160d5e49e1587a9f7b545710b76c5550c249d072bb1f4f099c8fb0