Analysis
-
max time kernel
137s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 18:14
Static task
static1
Behavioral task
behavioral1
Sample
60e75c00fe7fbd1654efb02fba50497a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
60e75c00fe7fbd1654efb02fba50497a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
60e75c00fe7fbd1654efb02fba50497a_JaffaCakes118.exe
-
Size
18KB
-
MD5
60e75c00fe7fbd1654efb02fba50497a
-
SHA1
9982f0679df108ae56bd9f60ef7458cbd61549d3
-
SHA256
6f481d74e9ae34f48880fd20f99f0cbe497741997f17260e00a80c7882822870
-
SHA512
cd59e9de55706a23a0432744c3924d51f0877d5362c19c2c58f987098abc89455f951c5acf4f9eb039f91a55050c166eefa2d6f5e3e002e665d1b4c1ff22138e
-
SSDEEP
384:wLEqQxiVrlrP3J59cNz/t7e5HELTaHzp9iu4Nw3t:uBN8z0JTp9zRt
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java = "file:///C:/Users/Admin/AppData/Local/Temp/60e75c00fe7fbd1654efb02fba50497a_JaffaCakes118.exe" 60e75c00fe7fbd1654efb02fba50497a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "file:///C:/Users/Admin/AppData/Local/Temp/60e75c00fe7fbd1654efb02fba50497a_JaffaCakes118.exe" 60e75c00fe7fbd1654efb02fba50497a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5060 60e75c00fe7fbd1654efb02fba50497a_JaffaCakes118.exe Token: SeRestorePrivilege 1828 dw20.exe Token: SeBackupPrivilege 1828 dw20.exe Token: SeBackupPrivilege 1828 dw20.exe Token: SeBackupPrivilege 1828 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5060 wrote to memory of 1828 5060 60e75c00fe7fbd1654efb02fba50497a_JaffaCakes118.exe 87 PID 5060 wrote to memory of 1828 5060 60e75c00fe7fbd1654efb02fba50497a_JaffaCakes118.exe 87 PID 5060 wrote to memory of 1828 5060 60e75c00fe7fbd1654efb02fba50497a_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\60e75c00fe7fbd1654efb02fba50497a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\60e75c00fe7fbd1654efb02fba50497a_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 18202⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1828
-