Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
94ffa7708f873510616ca18d89211f58_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
94ffa7708f873510616ca18d89211f58_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
94ffa7708f873510616ca18d89211f58_JaffaCakes118.exe
-
Size
26KB
-
MD5
94ffa7708f873510616ca18d89211f58
-
SHA1
e77fc55504afdafb7a66f379ab5d9950ffd23bc5
-
SHA256
2ac98a6dd114ec63d06ce3f19cab17100d0300a5a5b56fc8376eceedc840acdd
-
SHA512
cb32b72dec56cc41b7f8449d8b8f6b7a9b4f0b5e95927c3d6939e9943c6ccfee363dd44f399f2548757b58e9d505a1909b730564de2ce478803880e31e9862ee
-
SSDEEP
768:4fS46S8BN7xg7X/PMvlgBFsBVE5jbYMPZI:94L8N7xEPGlgBuG5jxPZI
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ir5ost.dll 94ffa7708f873510616ca18d89211f58_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94ffa7708f873510616ca18d89211f58_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3148 94ffa7708f873510616ca18d89211f58_JaffaCakes118.exe 3148 94ffa7708f873510616ca18d89211f58_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3148 94ffa7708f873510616ca18d89211f58_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 3148 wrote to memory of 608 3148 94ffa7708f873510616ca18d89211f58_JaffaCakes118.exe 5
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\94ffa7708f873510616ca18d89211f58_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\94ffa7708f873510616ca18d89211f58_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3148