Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 05:27
Static task
static1
Behavioral task
behavioral1
Sample
5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe
-
Size
196KB
-
MD5
5f30a44887d77ef2b49b132459d9d838
-
SHA1
b52fb37ffd170030d841713710d79792f59abd95
-
SHA256
663209674060d85bd422a01fbfec72d43bb9f3771823fabe5dffb117012122bd
-
SHA512
aea0941cc8da7e247ea205d44630bc49b09519645374c9c629f1c0d08f0d6bab2b08ad06102d9e409f3f5f2fcb02e6c26ceaad68617d47d2d1346c5d4ff2893e
-
SSDEEP
3072:m+GZ5ASSXyvclqCE8l8VutkQPFyQQz70DXdbMpN/Iva8Dp:m+YoqcllLleuyQPFQz7CqNQva8
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\help\B41346EFA848.dll 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe File opened for modification C:\Windows\help\B41346EFA848.dll 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765} 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\ = "SSUUDL" 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32\ = "C:\\Windows\\help\\B41346EFA848.dll" 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32\ThreadingModel = "Apartment" 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeBackupPrivilege 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Token: SeRestorePrivilege 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Token: SeRestorePrivilege 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Token: SeRestorePrivilege 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Token: SeRestorePrivilege 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Token: SeRestorePrivilege 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Token: SeBackupPrivilege 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Token: SeRestorePrivilege 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Token: SeRestorePrivilege 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Token: SeRestorePrivilege 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Token: SeRestorePrivilege 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe Token: SeRestorePrivilege 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1708 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe 30 PID 1956 wrote to memory of 1708 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe 30 PID 1956 wrote to memory of 1708 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe 30 PID 1956 wrote to memory of 1708 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe 30 PID 1956 wrote to memory of 1844 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe 32 PID 1956 wrote to memory of 1844 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe 32 PID 1956 wrote to memory of 1844 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe 32 PID 1956 wrote to memory of 1844 1956 5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f30a44887d77ef2b49b132459d9d838_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵PID:1708
-
-
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵PID:1844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD521451767bf78329b0f71cb6df1067585
SHA1a2f8fa04fb3391b74676f4e09e00bf9555b92789
SHA256816e2542516b0938cd0f16e457a9dc3d0593c7b2012cc612bf3cf428335b9e55
SHA5126c070ec70eb2d9cf9f2a01b86e902fd162ccd39f514ac9879702072fb61fc7d52bfa178fa579c055f93f27592fa9dec50673759a37f0ec4cefd963a2831840ad
-
Filesize
63B
MD54d0b3d85f93acea274d2a40e1985c945
SHA13a1a64ad0e0cbbc6238f47daab253426301bc540
SHA256cd0dc23716c4e42e0994a98e53935ef2cfb1b8c3b32f2512775bed74749ba92f
SHA512ec3682ed902be09bc20074d9d57c8a797c10057e175bb32db91af0308e5264641d8cabe48d71b41857b4e74d83218edb0c7675ad13c63165518e5a15fdd3bff1
-
Filesize
117KB
MD5191ce92ecbe4d75815382cc722b38ca8
SHA1af25f22dd721589fa7c114e609c3a28c902faf9d
SHA2561bbba303132b87e6e749a3c9548992c9b8493df111aaa365e31d3e3e88c5118c
SHA512b2c1ab3e269b676816da9478d93272bca3798d7afe7f79414bd1de638e73bf097b2a018d6c1e13054fea0064bd50e8ea999b9da5ffcb3c8acf7e3aa2c4f76888