Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe
-
Size
367KB
-
MD5
59ceeeb62847085a6e6837e51183c5f2
-
SHA1
565e1d0ab6c4fb4118c1f8e8a734c4f66a2811a3
-
SHA256
2e3e0527813065cbe3d75952f157374e209c1803b3833c1630d3b9b2424dc792
-
SHA512
8bd273808d1d9044cde49d39c763c8c1844fe4fc34f0afdc8376168eff97d212c37f5c83b80f7959f8ac084d90724bcfcce6fa12414dbc557839e115c6cea885
-
SSDEEP
6144:Xf3ipYZsiZh1H9oFVFvJYVQl4HogAiKJ7/C6JHfrzczOAA0n7aESBxI3DsFFy7cb:/ipYHh1H9o++9nzJ766JHfr2rSkIFFtB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3168 kOi31001lJhIb31001.exe -
Executes dropped EXE 2 IoCs
pid Process 4044 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe -
resource yara_rule behavioral2/memory/1000-1-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1000-2-0x0000000000400000-0x00000000004CB000-memory.dmp upx behavioral2/memory/4044-15-0x0000000000400000-0x00000000004CB000-memory.dmp upx behavioral2/memory/4044-21-0x0000000000400000-0x00000000004CB000-memory.dmp upx behavioral2/memory/1000-22-0x0000000000400000-0x00000000004CB000-memory.dmp upx behavioral2/memory/1000-23-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/3168-32-0x0000000000400000-0x00000000004CB000-memory.dmp upx behavioral2/memory/3168-39-0x0000000000400000-0x00000000004CB000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kOi31001lJhIb31001 = "C:\\ProgramData\\kOi31001lJhIb31001\\kOi31001lJhIb31001.exe" kOi31001lJhIb31001.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 4044 kOi31001lJhIb31001.exe 4044 kOi31001lJhIb31001.exe 4044 kOi31001lJhIb31001.exe 4044 kOi31001lJhIb31001.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 4044 kOi31001lJhIb31001.exe 4044 kOi31001lJhIb31001.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe Token: SeDebugPrivilege 4044 kOi31001lJhIb31001.exe Token: SeDebugPrivilege 3168 kOi31001lJhIb31001.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3168 kOi31001lJhIb31001.exe 3168 kOi31001lJhIb31001.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1000 wrote to memory of 4044 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 87 PID 1000 wrote to memory of 4044 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 87 PID 1000 wrote to memory of 4044 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 87 PID 1000 wrote to memory of 3168 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 88 PID 1000 wrote to memory of 3168 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 88 PID 1000 wrote to memory of 3168 1000 59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\ProgramData\kOi31001lJhIb31001\kOi31001lJhIb31001.exe"C:\ProgramData\kOi31001lJhIb31001\kOi31001lJhIb31001.exe" BOMBARDAMAXIMUM2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
C:\ProgramData\kOi31001lJhIb31001\kOi31001lJhIb31001.exe"C:\ProgramData\kOi31001lJhIb31001\kOi31001lJhIb31001.exe" "C:\Users\Admin\AppData\Local\Temp\59ceeeb62847085a6e6837e51183c5f2_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5dbb0eb6c9dcc7842f3bd38bf3fbc4128
SHA14dfdf0c722880fc56de84ba9fbe2b331ede3af2d
SHA2564e2d1728dcd4bf5e00803f80b0b3303e7443fcbd6a1218c3c854ec85bd08332a
SHA512398f4097892f00173628d2dc5ddd3e146f60490b47500b57288f820987c6c7ff0e6ef5b1b6bab9519a5b9566fb741890bfd9d73bc37e95cadfb01a7bea939cfe
-
Filesize
367KB
MD5a15b7137d68beb4303e7ba0630951eb1
SHA1acadac9d6344db0375e6c869daf7d452bc08698a
SHA2561441bb58095945af566ff56d77fc767a535e6ed835d318f38101a0c03bf05ead
SHA512701bf3976db5d1c6fa210f121fdb082a19b4dee5be3e3b06cc03e41c5b936f047842898bcd9e05fa040b80ad410ac3093af97ea4e0546a4f7ec04b05a1535a81