Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
65885257742e286a25fc6c64fb809b8d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
65885257742e286a25fc6c64fb809b8d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
65885257742e286a25fc6c64fb809b8d_JaffaCakes118.exe
-
Size
443KB
-
MD5
65885257742e286a25fc6c64fb809b8d
-
SHA1
b53132106e71dbc27407a7655a2e8d1b3c8c1472
-
SHA256
469ba12866ab891a48f252348f3d794e434cc7db3a95aa52bad50896e1b5a6aa
-
SHA512
ae36abe54fa2776043de0f4770109d3d6143a9c25ba10bfb4b4761fb988640b5570c838da755035e52ccaa53aa50891c05a84712a848467db3c4e25ecb64911d
-
SSDEEP
12288:djHXtuvJ5OTJpD6hLsMMDg/bD6ooBESJ:dhWiTJt6dDMMHa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1344 dA01803PbHoC01803.exe -
Executes dropped EXE 1 IoCs
pid Process 1344 dA01803PbHoC01803.exe -
resource yara_rule behavioral2/memory/60-1-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral2/memory/60-2-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/60-14-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/60-15-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral2/memory/1344-17-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/1344-25-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/1344-32-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\dA01803PbHoC01803 = "C:\\ProgramData\\dA01803PbHoC01803\\dA01803PbHoC01803.exe" dA01803PbHoC01803.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 60 65885257742e286a25fc6c64fb809b8d_JaffaCakes118.exe 60 65885257742e286a25fc6c64fb809b8d_JaffaCakes118.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 60 65885257742e286a25fc6c64fb809b8d_JaffaCakes118.exe Token: SeDebugPrivilege 1344 dA01803PbHoC01803.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1344 dA01803PbHoC01803.exe 1344 dA01803PbHoC01803.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 60 wrote to memory of 1344 60 65885257742e286a25fc6c64fb809b8d_JaffaCakes118.exe 88 PID 60 wrote to memory of 1344 60 65885257742e286a25fc6c64fb809b8d_JaffaCakes118.exe 88 PID 60 wrote to memory of 1344 60 65885257742e286a25fc6c64fb809b8d_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\65885257742e286a25fc6c64fb809b8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65885257742e286a25fc6c64fb809b8d_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:60 -
C:\ProgramData\dA01803PbHoC01803\dA01803PbHoC01803.exe"C:\ProgramData\dA01803PbHoC01803\dA01803PbHoC01803.exe" "C:\Users\Admin\AppData\Local\Temp\65885257742e286a25fc6c64fb809b8d_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD52bcf32a522b9222617c9361ff4906c96
SHA13240af3a3ecca00e88d6a8675aa32e916be7b114
SHA2564f10828f386e42fbec7c80ef33e612eb77e1cf940e185ad3944eeca6a8cf9ad0
SHA512590c7147f4a073825e6d36b2fc8246696efcf6c26e71a5e3ec73348c3c70604d47efe9d91a15b54331c3bbce3b3762b3ae586b0744c6d016c04e7759ecf36e6a