Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 13:20
Behavioral task
behavioral1
Sample
67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe
-
Size
16KB
-
MD5
67be3b42006b0d68b7d0a07728c16daa
-
SHA1
74ad241426962ade8241ba05120b8bbc48800f4a
-
SHA256
c920a3a7aa1c3d0bedf54775af398d8181b1dc9f81febf722881c48b493ed252
-
SHA512
5d6f9c8174d5bc1609ad198c2db4db550afc48bc6a77207c8cc301f435a6c870518e6e6c1dba1e7e47f83eef0cdcab7fb3b960d36af55ef248c3c64bbbdd0456
-
SSDEEP
384:J0KkDJcfEcb6Qx0i6/LAi4bOBcgAxwr6+e9Pfqbn1:RsvQCi6/Lp4C2x3ha5
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000a0000000234c6-4.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 460 Compatibility.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Compatibility.exe 67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Compatibility.exe 67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe File created C:\Windows\SysWOW64\Compatibility.exe Compatibility.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2856 67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe 2856 67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe 460 Compatibility.exe 460 Compatibility.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2856 67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 460 Compatibility.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2856 wrote to memory of 460 2856 67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe 87 PID 2856 wrote to memory of 460 2856 67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe 87 PID 2856 wrote to memory of 460 2856 67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe 87 PID 2856 wrote to memory of 1048 2856 67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe 88 PID 2856 wrote to memory of 1048 2856 67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe 88 PID 2856 wrote to memory of 1048 2856 67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe 88 PID 460 wrote to memory of 4408 460 Compatibility.exe 93 PID 460 wrote to memory of 4408 460 Compatibility.exe 93 PID 460 wrote to memory of 4408 460 Compatibility.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\67be3b42006b0d68b7d0a07728c16daa_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\Compatibility.exe"C:\Windows\system32\Compatibility.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\COMPAT~1.EXE > nul3⤵PID:4408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\67BE3B~1.EXE > nul2⤵PID:1048
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD567be3b42006b0d68b7d0a07728c16daa
SHA174ad241426962ade8241ba05120b8bbc48800f4a
SHA256c920a3a7aa1c3d0bedf54775af398d8181b1dc9f81febf722881c48b493ed252
SHA5125d6f9c8174d5bc1609ad198c2db4db550afc48bc6a77207c8cc301f435a6c870518e6e6c1dba1e7e47f83eef0cdcab7fb3b960d36af55ef248c3c64bbbdd0456