Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe
-
Size
31KB
-
MD5
64c66da98558a2f158c163e0d61abcf3
-
SHA1
aeb4fc4a555da0f7698d9334b3865889ee081d36
-
SHA256
280b33660320c06a2905ae18c994361b66f86c8f785ce912fc70100fb6097878
-
SHA512
e144773b2ff67f5f400be7283674c7c7a4cbd03344b8c13a2849b4aae791aed19b2de1255d6471635538b81449d427bc0c4d49d6910f2c80662aca8d3c94e881
-
SSDEEP
768:6T4wO+LokS0JARrVibDdPNfLxdGGVkT/bmyf05g58:GOaqrVSfW3s5z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2484 asdw.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\asdw.exe 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\asdw.exe 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe File created C:\Windows\SysWOW64\asdw.exe asdw.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 588 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2484 asdw.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 588 wrote to memory of 2484 588 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 84 PID 588 wrote to memory of 2484 588 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 84 PID 588 wrote to memory of 2484 588 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 84 PID 588 wrote to memory of 1600 588 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 85 PID 588 wrote to memory of 1600 588 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 85 PID 588 wrote to memory of 1600 588 64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe 85 PID 2484 wrote to memory of 2964 2484 asdw.exe 86 PID 2484 wrote to memory of 2964 2484 asdw.exe 86 PID 2484 wrote to memory of 2964 2484 asdw.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\64c66da98558a2f158c163e0d61abcf3_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\asdw.exe"C:\Windows\system32\asdw.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Windows\SysWOW64\asdw.exe > nul3⤵PID:2964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Users\Admin\AppData\Local\Temp\64C66D~1.EXE > nul2⤵PID:1600
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD564c66da98558a2f158c163e0d61abcf3
SHA1aeb4fc4a555da0f7698d9334b3865889ee081d36
SHA256280b33660320c06a2905ae18c994361b66f86c8f785ce912fc70100fb6097878
SHA512e144773b2ff67f5f400be7283674c7c7a4cbd03344b8c13a2849b4aae791aed19b2de1255d6471635538b81449d427bc0c4d49d6910f2c80662aca8d3c94e881