Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
63ff11fea935c0fa5896f205f038f93a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
63ff11fea935c0fa5896f205f038f93a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
63ff11fea935c0fa5896f205f038f93a_JaffaCakes118.exe
-
Size
689KB
-
MD5
63ff11fea935c0fa5896f205f038f93a
-
SHA1
79a4bb774ef09520e12f7cd5b02aae26050e4be1
-
SHA256
98214018a02076ddf594827091339e42f8882c1d81e13419627ca0156e822897
-
SHA512
aade392a1534396a5208a13718eb19c4fa55d36034b38b6d3238479b7a821e2efb712dacedcbafc15fd7e4fca068e9ef0b5a1148ff3f6da6a34b1a4cf5657672
-
SSDEEP
12288:UESqbtfO+m9k12pl3cnQ0/yZM49xyAnrCZmikyiv7WpF3Z4mxxjGdM2Pxyb19/OQ:UEJ8+mC2o/EMGplgs+QmXjpqxiqa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4924 4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63ff11fea935c0fa5896f205f038f93a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4924 4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 212 wrote to memory of 4924 212 63ff11fea935c0fa5896f205f038f93a_JaffaCakes118.exe 84 PID 212 wrote to memory of 4924 212 63ff11fea935c0fa5896f205f038f93a_JaffaCakes118.exe 84 PID 212 wrote to memory of 4924 212 63ff11fea935c0fa5896f205f038f93a_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\63ff11fea935c0fa5896f205f038f93a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\63ff11fea935c0fa5896f205f038f93a_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
787KB
MD5f0a704512c39c5e7c9f7d20754d73117
SHA10dce265582bb40a195006d93ca6d5594b58e5997
SHA25676ddab7b6d2a1a718019ecad77c07777b2ff77aa1761f46a2b489a3f8d560df0
SHA51254270baa7946490540e0a27da049849a8254048b2901ef87b9d80c23b3ce3461bbf6facf94f4a4e6f9fb97d58f75c6001e354aafa601f0dfc7510f03089ffb99