Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 16:38
Static task
static1
Behavioral task
behavioral1
Sample
9f255a5fd8e9cbb1e8c2b1c88d436665_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
9f255a5fd8e9cbb1e8c2b1c88d436665_JaffaCakes118.exe
-
Size
386KB
-
MD5
9f255a5fd8e9cbb1e8c2b1c88d436665
-
SHA1
b1583d74bd8eba91a43de585e4c13fa142441efc
-
SHA256
25a7825a3bb8e1777dcaec1627d0030492091f053d77d660aa026a7e80b0ce0f
-
SHA512
fa77764dcffabf9ebd295ddb741de5de8c1d899f20943579eff8c0aab8d3f204a5835e993271b847335ee6188db5bc6e3504c1e9b3b5f5f0c8d6c7aead25e27a
-
SSDEEP
6144:uptmZ62NlgsWxhFkZpXIGWvDwYNSZZa2TjaFJ7eIbH661cdfFI6u:StmLb2hFko5NS3LTk7pvchu
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
explorer.exepid process 2472 explorer.exe -
Executes dropped EXE 1 IoCs
Processes:
explorer.exepid process 2472 explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
9f255a5fd8e9cbb1e8c2b1c88d436665_JaffaCakes118.exeexplorer.exedescription pid process Token: SeDebugPrivilege 2604 9f255a5fd8e9cbb1e8c2b1c88d436665_JaffaCakes118.exe Token: SeDebugPrivilege 2472 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9f255a5fd8e9cbb1e8c2b1c88d436665_JaffaCakes118.exeexplorer.exedescription pid process target process PID 2604 wrote to memory of 2472 2604 9f255a5fd8e9cbb1e8c2b1c88d436665_JaffaCakes118.exe explorer.exe PID 2604 wrote to memory of 2472 2604 9f255a5fd8e9cbb1e8c2b1c88d436665_JaffaCakes118.exe explorer.exe PID 2604 wrote to memory of 2472 2604 9f255a5fd8e9cbb1e8c2b1c88d436665_JaffaCakes118.exe explorer.exe PID 2472 wrote to memory of 3024 2472 explorer.exe explorer.exe PID 2472 wrote to memory of 3024 2472 explorer.exe explorer.exe PID 2472 wrote to memory of 3024 2472 explorer.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f255a5fd8e9cbb1e8c2b1c88d436665_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f255a5fd8e9cbb1e8c2b1c88d436665_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe3⤵PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD53a0c056fba2bbf42f9666d4fc3c900b3
SHA1e56d46d5969470e54228bcc9a6eb4c562aeec6a0
SHA256360c40d068ab4cda089db1fce7f4225bb915810b21bb9bf9e51b1beb49edfda5
SHA5128da0bac2aaea0f1a6ac4aebe9c252de96289d3f063a649df2ee774cbaeb961fa4163f0992f26fb620a1758d6d4bd88da20c90ee261f004c71e4a3b8e45f3e689
-
Filesize
386KB
MD59f255a5fd8e9cbb1e8c2b1c88d436665
SHA1b1583d74bd8eba91a43de585e4c13fa142441efc
SHA25625a7825a3bb8e1777dcaec1627d0030492091f053d77d660aa026a7e80b0ce0f
SHA512fa77764dcffabf9ebd295ddb741de5de8c1d899f20943579eff8c0aab8d3f204a5835e993271b847335ee6188db5bc6e3504c1e9b3b5f5f0c8d6c7aead25e27a