Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe
-
Size
163KB
-
MD5
8d19f3dd50776ce064e2a665287682f6
-
SHA1
599fe3a97d9c3290a6d4f202fd251f605f5c1127
-
SHA256
7157e1469a315f2cfc8c38ee03a5c4d025428fba40a5cecc4859a9c3616265f8
-
SHA512
3497b1bd37ee46ad13a22e0fbf3a5737ffbd5ba94457a50c24bbd33728275001f7e2df3829b60af34b886ab70fc55fb697b60ce9fad74a261739cfa2c8b08164
-
SSDEEP
3072:3y+kOL/10H3UnADB/h/OwHdGBjIWVCbGHTYJWfl1iX3cO4e/P86rWiIaLHp066gV:3f+HHewAMWV1HTtrIcg
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2132 pacificpokersetup.exe -
Loads dropped DLL 6 IoCs
pid Process 2184 8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe 2132 pacificpokersetup.exe 2132 pacificpokersetup.exe 2132 pacificpokersetup.exe 2132 pacificpokersetup.exe 2132 pacificpokersetup.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pacificpokersetup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2184 8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe Token: SeBackupPrivilege 2184 8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2132 2184 8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe 31 PID 2184 wrote to memory of 2132 2184 8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe 31 PID 2184 wrote to memory of 2132 2184 8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe 31 PID 2184 wrote to memory of 2132 2184 8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe 31 PID 2184 wrote to memory of 2132 2184 8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe 31 PID 2184 wrote to memory of 2132 2184 8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe 31 PID 2184 wrote to memory of 2132 2184 8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\pacificpokersetup.exeC:\Users\Admin\AppData\Local\Temp\pacificpokersetup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5ef7b8fc0d77085b0ad9fb5aad5736d35
SHA17b5abc77d730544c82f469c5e181f220a21c7574
SHA256ef929da4856b72f9d56c3af9cc0c7164beff0016446b139f64746bf8bd9e9aed
SHA512fadb575e6abf1699dd0358d4fe0524d4c50008d168d90fb15aa7a93698e5410142bf899202c4aa32d962cac786b666126eec3ebdff21ec029015b9bf3c52ebb2
-
Filesize
161KB
MD58c97d8bb1470c6498e47b12c5a03ce39
SHA115d233b22f1c3d756dca29bcc0021e6fb0b8cdf7
SHA256a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a
SHA5127ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f
-
Filesize
30KB
MD53df61e5730883b2d338addd7acbe4bc4
SHA103166e6230231e7e3583cf9c8944f4967aa1bf1b
SHA2562efe9a54c8eb878711d9b6cd18f276838645aff52fe69d8a864376cb258ec616
SHA51236e9d705d22dad3d952b4da578a990f2b63ec2f9fbf2734efdaea9ecbd4f07a8d7232792eb5bdd81c553354d51334993cb6103c377f3483a680eac9e41cd2087
-
Filesize
3.3MB
MD5721c8b55439683e3434fbb72086c1661
SHA15122a32bcb894eb7b3a7f9c5f42d9e295643c55a
SHA25625055b2d675fc6ce6d230762a019dd4b3659fbb6cc6d8f1bec67e5d92e3da239
SHA512d0cc00c3f5fcc2b76d231c4712550f053b03ee4a979a5ece4d183b2d58044c63effcbab75afa80aab940f720a3d5fe9ca8c93fb1b1118801bb7f5b7242868d1d