Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe
-
Size
292KB
-
MD5
81ce2d43894247bb937aec302c389d66
-
SHA1
7c17dd6767ceb7ec9641e1eba67afd726c2a52b8
-
SHA256
63aed26cff6262ee228ebabd80de9e7e484d8b97f5c82168b50d0c037b147231
-
SHA512
0b450eb02ca935a6480947ede8fcb0dd3c055c03d2ca445b2d28bfbea694f7302e64832eccacf6b822c5f998805a01bcd5f2ce00e753c76be934c15583c6eb54
-
SSDEEP
6144:bHogBfdMhCuP79ww5uZbFxaSsBk3+ufkVsXXkSSuY:iQuxwGgbjPsBBuf05pT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2516 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\windows\xinstall44900.dll 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe File opened for modification C:\windows\xinstall44900.dll 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe File opened for modification C:\Windows\FileName.jpg 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe File created C:\Windows\FileName.jpg 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 2676 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Token: SeRestorePrivilege 2676 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Token: SeBackupPrivilege 2676 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Token: SeRestorePrivilege 2676 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Token: SeBackupPrivilege 2676 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Token: SeRestorePrivilege 2676 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Token: SeBackupPrivilege 2676 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Token: SeRestorePrivilege 2676 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k sougou1⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD54104e492c52eec748c7dabf6e7b7c6ae
SHA11934b8179d66b1cd77b9cc7895019e796d3002a8
SHA2565c300885b514ac531ea31663ac3ae0d33095673d58d29b29df698837ff26e93d
SHA512dea480d599d8ce9ea5c5fe6196ec088c5e13f24e1a067beaebb2819cbc6cbad1d41f0ce06f87961d508d673b7d0971af0abbadee77f118ec1bea612844d91058
-
Filesize
113B
MD507fe8484b92d4acfd0e3ff91f86cac0f
SHA1089972474357ed70b42279ad335e69e5ed738b35
SHA256c8f956edf97f3f70eeaaf637c6eae737cef8f1f32ef9b77c31cc1e489b60fe7f
SHA512c29101b830eb96edab28b6a368e793acbb25906274e063a367880418452008abbb8759c442e9076c8314771d5a51b01ba62aeab0329b3505de01356106ba36f2
-
Filesize
11.0MB
MD5e3056a9f88274f60970d9944444b54e5
SHA1a01885f4b912fd1d4319e6c0d687ba430cde7811
SHA2561ad5b897011d3b16319c5d5f0e924536ff5c93048dfc56e54103c9b001ae99a8
SHA512d703ea1d408a1afc403d66bf722fa7daaaa758026c0e648e4e5d9c095822b05f2c2cc6210532a94cf96a081b654c747f0bc8c4c9b5acd722f82171be39034abc