Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe
-
Size
292KB
-
MD5
81ce2d43894247bb937aec302c389d66
-
SHA1
7c17dd6767ceb7ec9641e1eba67afd726c2a52b8
-
SHA256
63aed26cff6262ee228ebabd80de9e7e484d8b97f5c82168b50d0c037b147231
-
SHA512
0b450eb02ca935a6480947ede8fcb0dd3c055c03d2ca445b2d28bfbea694f7302e64832eccacf6b822c5f998805a01bcd5f2ce00e753c76be934c15583c6eb54
-
SSDEEP
6144:bHogBfdMhCuP79ww5uZbFxaSsBk3+ufkVsXXkSSuY:iQuxwGgbjPsBBuf05pT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2172 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1120 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe 2172 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\windows\xinstall1203100.dll 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe File opened for modification C:\windows\xinstall1203100.dll 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe File opened for modification C:\Windows\FileName.jpg 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe File created C:\Windows\FileName.jpg 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 1120 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Token: SeRestorePrivilege 1120 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Token: SeBackupPrivilege 1120 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Token: SeRestorePrivilege 1120 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Token: SeBackupPrivilege 1120 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Token: SeRestorePrivilege 1120 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Token: SeBackupPrivilege 1120 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe Token: SeRestorePrivilege 1120 81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81ce2d43894247bb937aec302c389d66_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k sougou1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD54104e492c52eec748c7dabf6e7b7c6ae
SHA11934b8179d66b1cd77b9cc7895019e796d3002a8
SHA2565c300885b514ac531ea31663ac3ae0d33095673d58d29b29df698837ff26e93d
SHA512dea480d599d8ce9ea5c5fe6196ec088c5e13f24e1a067beaebb2819cbc6cbad1d41f0ce06f87961d508d673b7d0971af0abbadee77f118ec1bea612844d91058
-
Filesize
115B
MD550fa48b7f036b2cd9c3b1be4ec9116f2
SHA19e2bd4798cb350192ef90309c8979a9b5e815896
SHA2565e9b3a06dfee595fce9b83e52ba4bc17e792a9064e3bbda66595aac0033e4622
SHA5122cdcc66b08fb675ad394df82410b5ca63f9c71ff61ba988f8161a93117f91f5d3c2791090cc0b708884f0079976fc6cdb0812d872ddd72bce46fb21a362f856e
-
Filesize
11.4MB
MD50582cd282ae21ac579e1709f96b67587
SHA18f434d5ca340a4c918bba711342c1dfd5b4dcb61
SHA256b3bb5cc65faec37e82903b4dd798fa55061f547c683e1b41d325b53effa20428
SHA512b3b15974b49c8c5d6047f594aed68b9c5e7ac47aae8b2602f7bd40cc932918e4b5698e96546d130f5b436dca79154daf3e6572180b84e434d1939a4b6cf1c877