Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 01:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe
Resource
win7-20240704-en
6 signatures
150 seconds
General
-
Target
659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
659c356b89bbb110ebf2bb16d03999c0
-
SHA1
3f7464dcdde38baaf03a89c04cf4f0b0a8685317
-
SHA256
3e6638f056b852ac91d71d70a898fa1a22535499e2fa473c14a88e2eb0d290ee
-
SHA512
cf709232bc0066aed2d103973b74d91d8cac97a8377e37a7849604c946905e50b949f4e7798c4f524ae6f8e1c9a88dc69bc14ad9ed2e0abe84b090e92721f18f
-
SSDEEP
12288:jKtFBSt4K0hV0FIFviO5GXqoNQHWfCgpTKwWn+oKR+eEzo+QDLiviCzZJ3BMpu5u:G5x7mzgK/LEPGcg3J837Fj
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1104 set thread context of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3512 vbc.exe Token: SeSecurityPrivilege 3512 vbc.exe Token: SeTakeOwnershipPrivilege 3512 vbc.exe Token: SeLoadDriverPrivilege 3512 vbc.exe Token: SeSystemProfilePrivilege 3512 vbc.exe Token: SeSystemtimePrivilege 3512 vbc.exe Token: SeProfSingleProcessPrivilege 3512 vbc.exe Token: SeIncBasePriorityPrivilege 3512 vbc.exe Token: SeCreatePagefilePrivilege 3512 vbc.exe Token: SeBackupPrivilege 3512 vbc.exe Token: SeRestorePrivilege 3512 vbc.exe Token: SeShutdownPrivilege 3512 vbc.exe Token: SeDebugPrivilege 3512 vbc.exe Token: SeSystemEnvironmentPrivilege 3512 vbc.exe Token: SeChangeNotifyPrivilege 3512 vbc.exe Token: SeRemoteShutdownPrivilege 3512 vbc.exe Token: SeUndockPrivilege 3512 vbc.exe Token: SeManageVolumePrivilege 3512 vbc.exe Token: SeImpersonatePrivilege 3512 vbc.exe Token: SeCreateGlobalPrivilege 3512 vbc.exe Token: 33 3512 vbc.exe Token: 34 3512 vbc.exe Token: 35 3512 vbc.exe Token: 36 3512 vbc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85 PID 1104 wrote to memory of 3512 1104 659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\659c356b89bbb110ebf2bb16d03999c0_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3512
-