Analysis
-
max time kernel
139s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 13:53
Behavioral task
behavioral1
Sample
ab48170b246d682133ebca402e6bf359_JaffaCakes118.exe
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
ab48170b246d682133ebca402e6bf359_JaffaCakes118.exe
-
Size
141KB
-
MD5
ab48170b246d682133ebca402e6bf359
-
SHA1
e58de6bb5d272cca3378739531a14af1aa75dbe6
-
SHA256
ae393a7345202b1aef8d9617c3b7472f0ff6c538756111b7f28148aba42da348
-
SHA512
01264dfc22b2e34f54d433a6deec078c669f5f825f1c9e6bc07484c1584e2382371b1dcd99fb331f89c71e4f1e80c023e0c447102ab8aaa458df7ee17f8e6258
-
SSDEEP
3072:rypQFai2iI3FYEZg+4PxLWiFKBerp7DVG9EgyQH3rTsofQmPHE:rymEiTq1XU6WKgrp+EJi7QoIAE
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2044-0-0x0000000000400000-0x000000000046AF52-memory.dmp upx behavioral2/memory/2044-1-0x0000000000400000-0x000000000046AF52-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab48170b246d682133ebca402e6bf359_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeLockMemoryPrivilege 2044 ab48170b246d682133ebca402e6bf359_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2044 ab48170b246d682133ebca402e6bf359_JaffaCakes118.exe Token: SeSecurityPrivilege 2044 ab48170b246d682133ebca402e6bf359_JaffaCakes118.exe Token: SeShutdownPrivilege 2044 ab48170b246d682133ebca402e6bf359_JaffaCakes118.exe Token: SeTcbPrivilege 2044 ab48170b246d682133ebca402e6bf359_JaffaCakes118.exe