Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 16:12
Behavioral task
behavioral1
Sample
5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe
-
Size
25KB
-
MD5
5cacce8ac42d56cecdd22c1abf58c8dc
-
SHA1
093e18c5b828de48fbd052e5f807088c704c71be
-
SHA256
ac4fd590e2183f518ac51498dd344448dd657a58909b288e17054adcebdedcba
-
SHA512
6bda7a8a8e5b14941ab0a60c2d62922f40c0a70ca0634b0bbd7393b6274187878d76915651b2d3f31bf91804325772ce2a2a4c77cb51ad4864b9aeb074b9b7a1
-
SSDEEP
768:kLehOga3oBM1r6lNdDgGBLjYE2QaMRtQ/gxWha5T:UhgAr6a0j8w0h
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\tcuajvhp.sys 5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\tcuajvhp.sys 5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4124 syschk.exe -
Loads dropped DLL 1 IoCs
pid Process 2492 rundll32.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\teamozy.dll 5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\sjis_ext.nls syschk.exe File created C:\Windows\SysWOW64\syschk.exe 5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\syschk.exe 5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe File created C:\Windows\SysWOW64\teamozy.dll 5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 1292 5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe Token: SeSystemtimePrivilege 1292 5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1292 wrote to memory of 4124 1292 5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe 84 PID 1292 wrote to memory of 4124 1292 5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe 84 PID 1292 wrote to memory of 4124 1292 5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe 84 PID 4124 wrote to memory of 2492 4124 syschk.exe 85 PID 4124 wrote to memory of 2492 4124 syschk.exe 85 PID 4124 wrote to memory of 2492 4124 syschk.exe 85 PID 1292 wrote to memory of 1540 1292 5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe 97 PID 1292 wrote to memory of 1540 1292 5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe 97 PID 1292 wrote to memory of 1540 1292 5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\syschk.exeC:\Windows\system32\syschk.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\teamozy.dll,_StartRun@163⤵
- Loads dropped DLL
PID:2492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\\emsf.bat2⤵PID:1540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5a7f684a18e67bb96caadff94b38dd99f
SHA1238c50688e96cadc10ec454bf70cc0a3d27fbe7f
SHA2562c8465ad3c08282715f5eaefb6194817294238dfd2dc5c33fe285409366db8d1
SHA5120a28712a520cbddd094b4c4fd2d4a9db26ac0d2197eda4cda0b8a91dc91079087d9a3ed05b4b14279e05ad2760af176034500e27f9dac378a44caf281003f36a
-
Filesize
24KB
MD5eb9251cfc608667352ded7838005f282
SHA1aaabc9ef8d7e6ef63aa14139b1c111a1d74db33e
SHA25614ad3f93c22afb32d4fb1ae9c9b70fbe001c8ccc957e1fba8c4da31d45012c36
SHA512652019c8d0bd322d34f678becd5cb188de88d214793afe464fdb5a250217373a9b5d8e390e062948306aa1d1f2233591dbe510f91e6899692ebe7628224729ae
-
Filesize
230B
MD5764f3d327ef2d6474c9651a33e13a260
SHA194183f98611c9b178d159901f6cfd4d741718a99
SHA256f033477e30795cc376aaeb24e7bfffd7b2aa4bf472e74b1935634010c5942723
SHA512a49ae9397c52f0862d3ee49b45bd6c176d99404d222b52cec345fb3d6a36d6d264425dce5d832358499adcbf3a399f5f22983c2e49df64204405de96fa882cf8