Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe
-
Size
108KB
-
MD5
6224811e81eb1f1b9309020c6be56ffa
-
SHA1
1a4b0e687582003184536f376d458062022dc239
-
SHA256
7f02e572a7d7d1b92886dcd13c0725940ad81df911a679c654d954a5f12fef5b
-
SHA512
0a547a7f2fec7f76b02ac8527a56f5ff1f7ea4957775d473b69012677c1d7b7da86bdb77be14dfe3f92be5d3c87a1ab8cc545bca774a98fd53ad290c8aeba162
-
SSDEEP
3072:FlQYFCq65SnhM21E7C0M008oM0rpsJJHHpU:FlhFCq65cDM09Hr+JR2
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\xoyc.ini 6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe -
Kills process with taskkill 1 IoCs
pid Process 2132 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2068 6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe 2068 6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe 2068 6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe 2068 6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe 2068 6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2132 taskkill.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2132 2068 6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2132 2068 6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2132 2068 6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2132 2068 6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6224811e81eb1f1b9309020c6be56ffa_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im ZhuDongFangYu.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5eeabec6fdceac7abf26fe25135e38855
SHA1e63e886d422201a25bd527560fef8cbc5986da26
SHA256031759f4223f9424d40b1feffc2a77349607b03819122f2c236f75f78e80710c
SHA512c781ceaa6d1c6f8abefbe7b46a396f5191b2098bdfad7bcdd0d0cb04b651d90411872f8ecb4a3eb71f3da258d7d931277dbd8fdc5356fcacb9c9b5f127ed0187