Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe
-
Size
31KB
-
MD5
64c66da98558a2f158c163e0d61abcf3
-
SHA1
aeb4fc4a555da0f7698d9334b3865889ee081d36
-
SHA256
280b33660320c06a2905ae18c994361b66f86c8f785ce912fc70100fb6097878
-
SHA512
e144773b2ff67f5f400be7283674c7c7a4cbd03344b8c13a2849b4aae791aed19b2de1255d6471635538b81449d427bc0c4d49d6910f2c80662aca8d3c94e881
-
SSDEEP
768:6T4wO+LokS0JARrVibDdPNfLxdGGVkT/bmyf05g58:GOaqrVSfW3s5z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2344 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2124 asdw.exe -
Loads dropped DLL 2 IoCs
pid Process 292 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 292 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\asdw.exe asdw.exe File created C:\Windows\SysWOW64\asdw.exe 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\asdw.exe 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 292 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2124 asdw.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 292 wrote to memory of 2124 292 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 30 PID 292 wrote to memory of 2124 292 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 30 PID 292 wrote to memory of 2124 292 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 30 PID 292 wrote to memory of 2124 292 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 30 PID 292 wrote to memory of 2344 292 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 31 PID 292 wrote to memory of 2344 292 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 31 PID 292 wrote to memory of 2344 292 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 31 PID 292 wrote to memory of 2344 292 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 31 PID 2124 wrote to memory of 2392 2124 asdw.exe 32 PID 2124 wrote to memory of 2392 2124 asdw.exe 32 PID 2124 wrote to memory of 2392 2124 asdw.exe 32 PID 2124 wrote to memory of 2392 2124 asdw.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\SysWOW64\asdw.exe"C:\Windows\system32\asdw.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Windows\SysWOW64\asdw.exe > nul3⤵PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Users\Admin\AppData\Local\Temp\64C66D~1.EXE > nul2⤵
- Deletes itself
PID:2344
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD564c66da98558a2f158c163e0d61abcf3
SHA1aeb4fc4a555da0f7698d9334b3865889ee081d36
SHA256280b33660320c06a2905ae18c994361b66f86c8f785ce912fc70100fb6097878
SHA512e144773b2ff67f5f400be7283674c7c7a4cbd03344b8c13a2849b4aae791aed19b2de1255d6471635538b81449d427bc0c4d49d6910f2c80662aca8d3c94e881