Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe
-
Size
253KB
-
MD5
a7538e5161877d3b22566971d4f184d3
-
SHA1
4985a41c46d975ee8ee5217f0010dd97b453afee
-
SHA256
de028b67912f75f06a1ffd2a84d4537226b14468c7ea516efe9b1152a1616147
-
SHA512
510a0a14b76b6353418a9360b4e65bd58b6ce32765f228210ce58852cd786518df1aca566b77e8ae8875e2820e9adacf354ce5b6876229f40f41123f67c3c31b
-
SSDEEP
6144:KjW2Y9wUW7T6yc+xbUVXrbhG/ogXnAqVKHxUnM1RTJ:WY6Z7TA+xoVXrb0QgXn5V2aMZ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\A7538E~1.EXE," a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\A7538E~1.EXE" a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\946155c4 = "vŸµI¾é“fðì.°Iú…ÁüÝ@@V\n¥5ªC¼~€ñ\fíéɵòM«‘À\x0fAüôí\x0eu-H\x19\"²´Ú§\u0081Ìlðž+ñ\tp\u0090‹· \x03²ž\rŸ\b«l±°¨ìƒ‡ÉÐÁd9Ý\x153›5\x04]£\x12Ýyˆ±-½\x15i³\u0090Qƒ\x1cõêqb+\x155ø1ù\u00a0u¥U\x019…-\u00a0u\u008dQ)8\t\x19ÈÅ\u008d\x04½eÂÉ)¹…ûm+êeš\x12í}¨Â\"Úó¡pô\u00ad1‘¤ÓQ\u008dMíá•uC[T\x1cü1iIœ1\u00ad\x1d3›ìäô\u008d¹Jê””€\x01\u00adÊ3íÙ\x11\u00adÙAUñ‰³\x1d´Ù\f•ø€b<]9´ÂÅÑ*]™\x02\x18Áôás“\x14\x1bUy\u008d¡EQYã\x11U2Ù\x03¥íM±‘\u00a0¼" a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\A7538E~1.EXE" a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe Token: SeSecurityPrivilege 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe Token: SeSecurityPrivilege 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe Token: SeSecurityPrivilege 2072 a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a7538e5161877d3b22566971d4f184d3_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072