Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
60bdf7c3d6957172dc169d6518e52978_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
60bdf7c3d6957172dc169d6518e52978_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
60bdf7c3d6957172dc169d6518e52978_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
60bdf7c3d6957172dc169d6518e52978
-
SHA1
f76ce2db0ebd67d0c7122b7f67a09143ac6c0a79
-
SHA256
75d6ae3fbeacc9284ce6b3b029797ebb94073c439d5536bb0fb00fa6127b8e6d
-
SHA512
65577fb4b4d3f5eee4bbe2080c216fb867b7338c2603dfcb18730c230a6590114c23f8abd4a7339767fb721450244cf34b16cfcf263e158f19d9ee17273eec8d
-
SSDEEP
24576:ylfSvhj0rs8RHe2t3mxiBcw4IpQwOwUHqUhjXhHUuX:A6mrs8R++3hSqp+/Kyxt
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D62AA0D-2FB2-CF34-B7B9-5E902B33A16B} 60bdf7c3d6957172dc169d6518e52978_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D62AA0D-2FB2-CF34-B7B9-5E902B33A16B}\stubpath = "C:\\Program Files (x86)\\Bifrost\\server.exe s" 60bdf7c3d6957172dc169d6518e52978_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Bifrost\server.exe 60bdf7c3d6957172dc169d6518e52978_JaffaCakes118.exe File created C:\Program Files (x86)\Bifrost\server.exe 60bdf7c3d6957172dc169d6518e52978_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2432 60bdf7c3d6957172dc169d6518e52978_JaffaCakes118.exe Token: SeDebugPrivilege 2432 60bdf7c3d6957172dc169d6518e52978_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60bdf7c3d6957172dc169d6518e52978_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\60bdf7c3d6957172dc169d6518e52978_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2432