Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 21:51
Static task
static1
Behavioral task
behavioral1
Sample
8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe
-
Size
152KB
-
MD5
8c1c151afa61de888de5954a5d6c0a06
-
SHA1
e4402911da92d8f5288066a3e4b1b1cb50efb180
-
SHA256
592860e784ff96d9530ebd3ae455f5605bb6b819d5636cca43ccd9a1cf02eeaf
-
SHA512
d1e4b6545040f72d11413f359f15108978268718c80ff4b500fac7e91517000e7afe2d4fa90d984d18866eb11e3c21406dac48ccb6c19e694477312e4d102ba8
-
SSDEEP
3072:mZ7LJdATD5BqMdcj/7kdQMgLPYUgw3xpAXJEz33YNx:mZ7dd2VBqXnkK3LAUgw3MuYH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2336 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2104 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe 2336 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\windows\SysWOW64\fucktray2420000.dll 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Iypt\Vuwplkago.pic 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe File created C:\Program Files (x86)\Iypt\Vuwplkago.pic 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2104 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe 2104 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe 2104 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe 2104 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 2104 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe Token: SeRestorePrivilege 2104 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe Token: SeBackupPrivilege 2104 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe Token: SeRestorePrivilege 2104 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe Token: SeBackupPrivilege 2104 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe Token: SeRestorePrivilege 2104 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe Token: SeBackupPrivilege 2104 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe Token: SeRestorePrivilege 2104 8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5ed3a784603cc863fe9781b5139a8c27a
SHA1c0253c698268c8a0283ce2affdad4f985c69cfc1
SHA2563115c3ae90ea55d6867dd05d2ba1c49bf68d89e5b5e9e02def76ae0335344700
SHA512451db926af288b490fd212a5b13b0ef42dffe3e544d118b25ffb4ef953a5bebd4e52b4198355cf21205586bea936387e9b87d152a51d48e8acf54492774575de
-
Filesize
124B
MD576101bb4f713e5824a4abd01492fd4da
SHA1662fc5af862a049951614af4afd719910f7309f9
SHA256f2d32fae8eb118ff95094312813dff4c84665190dcd4aed51e734113d4f77b62
SHA512e8326443af29a525bc038a41a1905032594d4431d439a1f9633181dfeb165fe79c74c0f2ff6dd10bcd1401afce3f0c00cca456ac42b780b968a8736532841f0b
-
Filesize
112KB
MD579dd66ade2b79e99e4413911da706ba7
SHA19a9305a84358ff4e08364e1698817b6b8cdf7862
SHA256cef0b92ecd5de2b7898796b68c15fcd15116591e480b74129f6161f5e3016d21
SHA51206d18adae70fae76b13adf2b7cb791cedd3f5e57caf7d9d0dedff81b1ec847cc0f9857354f5bc8da175be97d79c787036532c72842f1c08aca91e44d9419cbe7