Analysis
-
max time kernel
12s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe
-
Size
217KB
-
MD5
6a6db2774a1254631702a1224a3d981a
-
SHA1
85e6ed05f70b97b0c0db9ef8e16bb1abc7045cd3
-
SHA256
85024edb05add565237c5380238ecdd6e8b497f74a0b08bfbe05d93df7a1f3bd
-
SHA512
eba1e814f95642f3b3b5c2dbc269e59435390a9c254f02ea5774419a0a58945a6c545e5f80538169927376cc86c8eb50b06eb6bc6f5c37964414869e8924a7c3
-
SSDEEP
6144:88mueCMabhgcjGE5Gmtjgi1SMp0eAiUwkBNk:UahFGEFJzNpkdNk
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2564 set thread context of 2712 2564 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 29 PID 2712 set thread context of 2156 2712 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2156 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2156 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe Token: SeDebugPrivilege 2156 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2564 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 2712 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2712 2564 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2712 2564 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2712 2564 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2712 2564 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2712 2564 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2712 2564 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2712 2564 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2712 2564 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2712 2564 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 29 PID 2712 wrote to memory of 2156 2712 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2156 2712 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2156 2712 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2156 2712 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2156 2712 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2156 2712 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2156 2712 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2156 2712 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2156 2712 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2156 2712 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2156 2712 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2156 2712 6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6a6db2774a1254631702a1224a3d981a_JaffaCakes118.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-