Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe
-
Size
708KB
-
MD5
5e6eb03cac6ae18ff459e5a11f128541
-
SHA1
059e2450b85609369289574dea5f78d3873043b0
-
SHA256
4b3cc1aacb517e6fac17d2be0d14a0550d76b7a8a074a37b8e2e90050439e81b
-
SHA512
c05c7a245eb979c3cbf7ad6e1dad53929309d8bd3f7ea391ba5598ba2f5db6537be1070aa9dd02dd2e2e75f6623a2120c91d13923159bc4c00be48a57f35608e
-
SSDEEP
12288:iKyMfyodxludEDhVEuIgDWLOnjnv/QW/WuSkF3Z4mxxUrkrfDvqJEJOlSDE0:icq+uaDhVXIziT9/WuSkQmX6kTDSdSDv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2592 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2280 svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\svchost.exe 5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe File opened for modification C:\Windows\svchost.exe 5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe File created C:\Windows\UNINSTAL.BAT 5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1628 5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe Token: SeDebugPrivilege 2280 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 svchost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2728 2280 svchost.exe 31 PID 2280 wrote to memory of 2728 2280 svchost.exe 31 PID 2280 wrote to memory of 2728 2280 svchost.exe 31 PID 2280 wrote to memory of 2728 2280 svchost.exe 31 PID 1628 wrote to memory of 2592 1628 5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe 32 PID 1628 wrote to memory of 2592 1628 5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe 32 PID 1628 wrote to memory of 2592 1628 5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe 32 PID 1628 wrote to memory of 2592 1628 5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe 32 PID 1628 wrote to memory of 2592 1628 5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe 32 PID 1628 wrote to memory of 2592 1628 5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe 32 PID 1628 wrote to memory of 2592 1628 5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e6eb03cac6ae18ff459e5a11f128541_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\UNINSTAL.BAT2⤵
- Deletes itself
PID:2592
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2728
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD538e7e7eb8e2c710c96f205b9bd48442f
SHA11b88d3456fd002ea43df05a5d587a5b34a840410
SHA2560b1ba40a1a63619ec6328aab939e3b270e6c458b644fa45dc6fa03c6666ee5ef
SHA512851964d3d2b076bb0548f120541fada01882611c2a1b12527cc11998de4f3044087de4b8cb3d98347cd6a0c6f4884e1a28208d728f85edca306a835c9b59d82f
-
Filesize
708KB
MD55e6eb03cac6ae18ff459e5a11f128541
SHA1059e2450b85609369289574dea5f78d3873043b0
SHA2564b3cc1aacb517e6fac17d2be0d14a0550d76b7a8a074a37b8e2e90050439e81b
SHA512c05c7a245eb979c3cbf7ad6e1dad53929309d8bd3f7ea391ba5598ba2f5db6537be1070aa9dd02dd2e2e75f6623a2120c91d13923159bc4c00be48a57f35608e