Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
5c790f10afc84cb98fd5601c36be7ed1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5c790f10afc84cb98fd5601c36be7ed1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5c790f10afc84cb98fd5601c36be7ed1_JaffaCakes118.exe
-
Size
66KB
-
MD5
5c790f10afc84cb98fd5601c36be7ed1
-
SHA1
af41a6a57ee8223b06bbad6c0ea330450e127b8e
-
SHA256
e06117b626da713e7cdb1f6ab31a6ae2ce88b58368254a18dd3cc556c9b2999d
-
SHA512
a4ba5a4a28faf4cb4493c9c410a131b72a9debb2d46f206a2ae7d76e4eb6c46d15a5d8b59ce1c021b55b678ebdda32615c7dd6d1fbe9ada242f542343f712705
-
SSDEEP
1536:FQPXEmAiRm2VfvmNFnToIf6HTRLar5ZONrWKym:i9Vfv6tTBfoTRLar5ZONrWKym
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MediaCenter\Parameters\ServiceDll = "C:\\Windows\\system32\\RqmrtqC.dll" 5c790f10afc84cb98fd5601c36be7ed1_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2764 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2624 5c790f10afc84cb98fd5601c36be7ed1_JaffaCakes118.exe 2324 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\RqmrtqC.dll 5c790f10afc84cb98fd5601c36be7ed1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2624 5c790f10afc84cb98fd5601c36be7ed1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2764 2624 5c790f10afc84cb98fd5601c36be7ed1_JaffaCakes118.exe 32 PID 2624 wrote to memory of 2764 2624 5c790f10afc84cb98fd5601c36be7ed1_JaffaCakes118.exe 32 PID 2624 wrote to memory of 2764 2624 5c790f10afc84cb98fd5601c36be7ed1_JaffaCakes118.exe 32 PID 2624 wrote to memory of 2764 2624 5c790f10afc84cb98fd5601c36be7ed1_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c790f10afc84cb98fd5601c36be7ed1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c790f10afc84cb98fd5601c36be7ed1_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\5C790F~1.EXE > nul2⤵
- Deletes itself
PID:2764
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵PID:2020
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵
- Loads dropped DLL
PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD576b31218280800593e0db1fdd5e7a32d
SHA11be528e4349d72471d1a0f76ae714b60f25c72c2
SHA2566126eb395e928e60d2aee855096613601789c26900dfa35a75682f5d60895531
SHA512af38b6fb93278b88bbae2baf72ae0586a1302d3f54074a7986564ef96350e2607cf63a1949d9610f0922deece53a621e7f0e1602afb61cd4853add7f7554fa38