Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe
-
Size
312KB
-
MD5
62621a312ed90ed75b001c699323e8ad
-
SHA1
eb75d807882e291a7d4b51f159f1bf751d47c0f5
-
SHA256
21386113f911ef4876d3c851f51f424abbf50f178ed1488695f51bf2600a6ea7
-
SHA512
696634ede2820b31c243d144a86b265fd5e269e51f623e760ea0571b5c935a5dc32d35b287b16eaf8da3a5270aa40983f5f84bb184db104f1bf1ff54cad9641a
-
SSDEEP
6144:i65cUhWas9kXPucRS7XZN4XxyORRTQx4jWTjf3uX2M9873yLK:Nc8LGcsLMXYORJQ6jKf3up9873y
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4748 iBpInFlPjEg01805.exe -
Executes dropped EXE 1 IoCs
pid Process 4748 iBpInFlPjEg01805.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\iBpInFlPjEg01805 = "C:\\ProgramData\\iBpInFlPjEg01805\\iBpInFlPjEg01805.exe" iBpInFlPjEg01805.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: iBpInFlPjEg01805.exe File opened (read-only) \??\X: iBpInFlPjEg01805.exe File opened (read-only) \??\Y: iBpInFlPjEg01805.exe File opened (read-only) \??\P: iBpInFlPjEg01805.exe File opened (read-only) \??\H: iBpInFlPjEg01805.exe File opened (read-only) \??\I: iBpInFlPjEg01805.exe File opened (read-only) \??\J: iBpInFlPjEg01805.exe File opened (read-only) \??\L: iBpInFlPjEg01805.exe File opened (read-only) \??\R: iBpInFlPjEg01805.exe File opened (read-only) \??\T: iBpInFlPjEg01805.exe File opened (read-only) \??\V: iBpInFlPjEg01805.exe File opened (read-only) \??\G: iBpInFlPjEg01805.exe File opened (read-only) \??\N: iBpInFlPjEg01805.exe File opened (read-only) \??\S: iBpInFlPjEg01805.exe File opened (read-only) \??\M: iBpInFlPjEg01805.exe File opened (read-only) \??\K: iBpInFlPjEg01805.exe File opened (read-only) \??\O: iBpInFlPjEg01805.exe File opened (read-only) \??\Q: iBpInFlPjEg01805.exe File opened (read-only) \??\W: iBpInFlPjEg01805.exe File opened (read-only) \??\Z: iBpInFlPjEg01805.exe File opened (read-only) \??\E: iBpInFlPjEg01805.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe Token: SeDebugPrivilege 4748 iBpInFlPjEg01805.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4748 iBpInFlPjEg01805.exe 4748 iBpInFlPjEg01805.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4684 wrote to memory of 4748 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 84 PID 4684 wrote to memory of 4748 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 84 PID 4684 wrote to memory of 4748 4684 62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\ProgramData\iBpInFlPjEg01805\iBpInFlPjEg01805.exe"C:\ProgramData\iBpInFlPjEg01805\iBpInFlPjEg01805.exe" "C:\Users\Admin\AppData\Local\Temp\62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD53f99860ed6a73ff6065f9964855091bb
SHA1b22c6ebba8cb1253cf1bce165a3258324979ffa2
SHA25649a7f66041a24c723fad45d444c50cac33a84cb275eb61325b2900f731d469e9
SHA512c15cee717440bddc16e5026d96f9525e278749db48b681ae110c4d4cc86b47e159a787457a1ca8dfd770280e53a350543081969349ba099cffa1a7bf7b77b19e