Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe
-
Size
57KB
-
MD5
84c11681fd41fdc5d5e458a385747488
-
SHA1
b13bcadfd8f77f32b045f101f1e35f15d3a5b26d
-
SHA256
ebbcec8e3ff4f2118bedd9da172899d67ace1a830808b1d2fc1704edc9f84838
-
SHA512
b558846e7d6da8cbd820e55cb429ef33017e78a4e26e836bb019676bdaf5af1bc72d91a624648af8cf72f8aa9e1d2270b7edcbd54e0500abf7e0c007c1262647
-
SSDEEP
1536:H5DfoeWJ/JSgHDs1Aov788o7PC5XOcSptZSvs3EfcVhmBvrB:H1foeg/J5HVozj2SOcSptnEfghmFB
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2292 set thread context of 2316 2292 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2316 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe 2316 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2292 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2316 2292 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2316 2292 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2316 2292 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2316 2292 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2316 2292 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2316 2292 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2316 2292 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2316 2292 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe 30 PID 2316 wrote to memory of 1300 2316 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1300 2316 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1300 2316 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1300 2316 84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\84c11681fd41fdc5d5e458a385747488_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316
-
-