Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 22:07
Behavioral task
behavioral1
Sample
a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe
Resource
win7-20240704-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe
-
Size
159KB
-
MD5
a01f06f36e4be328ea5b9939afbdb43b
-
SHA1
801a6b7ba8b885e24ad8e924ef3ffafca69e2efb
-
SHA256
723de228777235e5aba067d261e1eae26b5b08b5acd785814088d2dfef4b2964
-
SHA512
fb5ed445ea0f25022ee8a73e0dcdf68da5c606402a5ec83c9bf904ed38e635499114b787285cc0d516533f5ac59fcf1be7d350e40610a70fdb3d2ff56058ef5e
-
SSDEEP
3072:eZty12jmThk8KWg+GV7caWDsFpcST34GIKtG7F7uSL5Nbe40VwWAA80kXKj:Gy1+mThk/vtWibToGIUGh7FL5Y4680kW
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2352-0-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe Token: SeDebugPrivilege 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1176 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 21 PID 2352 wrote to memory of 384 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 3 PID 2352 wrote to memory of 432 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 5 PID 2352 wrote to memory of 492 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 7 PID 2352 wrote to memory of 500 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 8 PID 2352 wrote to memory of 604 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 9 PID 2352 wrote to memory of 684 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 10 PID 2352 wrote to memory of 768 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 11 PID 2352 wrote to memory of 820 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 12 PID 2352 wrote to memory of 848 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 13 PID 2352 wrote to memory of 968 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 15 PID 2352 wrote to memory of 280 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 16 PID 2352 wrote to memory of 1040 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 17 PID 2352 wrote to memory of 1056 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 18 PID 2352 wrote to memory of 1116 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 19 PID 2352 wrote to memory of 1128 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 20 PID 2352 wrote to memory of 1176 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 21 PID 2352 wrote to memory of 1260 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 23 PID 2352 wrote to memory of 1444 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 24 PID 2352 wrote to memory of 1600 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 25 PID 2352 wrote to memory of 1572 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 26 PID 2352 wrote to memory of 3012 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 27 PID 2352 wrote to memory of 2172 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2476 2352 a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe 29
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:604
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:1444
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:1600
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS1⤵PID:684
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:768
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted1⤵PID:820
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"2⤵PID:1128
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:848
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵PID:2172
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService1⤵PID:968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService1⤵PID:280
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1040
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1056
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork1⤵PID:1116
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a01f06f36e4be328ea5b9939afbdb43b_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵PID:1260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation1⤵PID:1572
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe1⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\1540376265\zmstage.exeC:\Users\Admin\AppData\Local\Temp\1540376265\zmstage.exe1⤵PID:2476