Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe
-
Size
255KB
-
MD5
87ebcc681d9018ec1f6fb1958743a6b1
-
SHA1
5b6a0f77ca333d6e8e621cb1477a3475e406b02d
-
SHA256
dfc959e8684ce11f9dafd16986f0d05d2a9e3c03da55172dacd175be216a5db4
-
SHA512
2ed6cef44c24e815cde53d754baa765585bc3c4225f57888c2ee6bbd4d92cd42457ba0af48102d07c8c20f9b1f5512a912989d6f5eba71c3854531076c7ed134
-
SSDEEP
3072:n0VC2gLy9ML+WhzIU4tNe157PwqLqn3Wi8mUUt+COaLH1DsG0SKW3WVJA7cw3/7m:xjErtNe/ss+GPmd+Na/Yy9v74R3bB
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\87EBCC~1.EXE," 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\87EBCC~1.EXE" 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d792ff5b = "MŒö÷\x7f†4ÐæÊ®ˆb% 4dt\x1fÚ\a—ªiȬÍ\x1f\x1eùD«AÙ\x1cÛùwÞ\x1dÌÛgW\x1bà½È\tšÂz,çŒ\r\x0f;u\x16ˆ¥›´=ìVBðÅ=\u009djwV0Âwë„FéAý|+\v~³™=Ó\vÁ…)[‘¤BÓ[‰â‹#l\x05C!»~\x19+\x03\nC½Û¼Z~Vñ¶N:«†T{ƒºîÓê‹’&šk:\våÃZ«›óþk%»v-\x1b¼\x1b®ÜZ±–\x1b\x1dL\x16þ[VÒ\x1ek³»\x02*+ÎyúkSKõ\v3\x063ËâÓL›“\tâ,¼\vV©¥\v+г1ó\u008d&2vA‚£›¶6¾¦\x03Î,+²Ó¢K飋K>¤\væû¢Å¹¶¶«õ{\x06\x1d\x02‚’\x13•M\x0e=j¬" 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\87EBCC~1.EXE" 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe Token: SeSecurityPrivilege 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe Token: SeSecurityPrivilege 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe Token: SeSecurityPrivilege 2204 87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\87ebcc681d9018ec1f6fb1958743a6b1_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204