Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 06:30
Static task
static1
Behavioral task
behavioral1
Sample
6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe
-
Size
84KB
-
MD5
6a94345f87153f5e209c7dd5577743e9
-
SHA1
906982db48697800af1442fe204ac3b09a4c84de
-
SHA256
e6cc3940f8070cdb356e7846c0ba743a204084050fd44df783942029d73982fa
-
SHA512
5f2731bac42bafa051b20d84d418fed4928e34ceea434d1b68c1fccea47d0fdc54a774d3f7956762ed43d4d0f13480f34fc069e6869adeb57395a9f63389ec45
-
SSDEEP
768:HHw92HEpz7IPs4zdw+owNYjNPbL7a5RQRmbz6Bos8nmw+owNYjZ4zvQHEpz7Ij9R:a2EI+OQNPbna59be6n7OQ7EIZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeAuditPrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeBackupPrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeCreatePermanentPrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeCreateTokenPrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeDebugPrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeImpersonatePrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeManageVolumePrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: 32 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeRestorePrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeSystemtimePrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeTcbPrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeTcbPrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: SeUndockPrivilege 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe Token: 35 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe 1008 6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6a94345f87153f5e209c7dd5577743e9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1008