Analysis
-
max time kernel
141s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 04:16
Static task
static1
Behavioral task
behavioral1
Sample
8d4872e8279a18434240c1f32e0d873b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8d4872e8279a18434240c1f32e0d873b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d4872e8279a18434240c1f32e0d873b_JaffaCakes118.exe
-
Size
713KB
-
MD5
8d4872e8279a18434240c1f32e0d873b
-
SHA1
592ebcf675440b48762fe08d2e67928be3ce4d10
-
SHA256
a1fb297ba0c3bbdce4edd0bc9eeed58b2f18d536d0b2fc5a8ff36b438fde36c6
-
SHA512
836549cbb3253dc9b5c0c63380d433b384466bd2ef1167b1bedba81b5a87535de46ce3baca12e3584a78394c431d76dc4938d01b5620167c321d5be90dcbe5dd
-
SSDEEP
12288:ZKmPzSzDtQEhH6l+TBF9McJ7L9jOF3Z4mxxUfYgsCBe3vyPOuzZkxvm2:dP+zD6cHDz9M07LkQmXUfYg1gSO0k1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2684 www.hmhk.cn.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\www.hmhk.cn.exe 8d4872e8279a18434240c1f32e0d873b_JaffaCakes118.exe File created C:\Windows\www.hmhk.cn.exe 8d4872e8279a18434240c1f32e0d873b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d4872e8279a18434240c1f32e0d873b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language www.hmhk.cn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1148 8d4872e8279a18434240c1f32e0d873b_JaffaCakes118.exe Token: SeDebugPrivilege 2684 www.hmhk.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 www.hmhk.cn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d4872e8279a18434240c1f32e0d873b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8d4872e8279a18434240c1f32e0d873b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
C:\Windows\www.hmhk.cn.exeC:\Windows\www.hmhk.cn.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
713KB
MD58d4872e8279a18434240c1f32e0d873b
SHA1592ebcf675440b48762fe08d2e67928be3ce4d10
SHA256a1fb297ba0c3bbdce4edd0bc9eeed58b2f18d536d0b2fc5a8ff36b438fde36c6
SHA512836549cbb3253dc9b5c0c63380d433b384466bd2ef1167b1bedba81b5a87535de46ce3baca12e3584a78394c431d76dc4938d01b5620167c321d5be90dcbe5dd