Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 19:50
Static task
static1
Behavioral task
behavioral1
Sample
ac58d0d6bc54c91eee2e3fdc513f9c23_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ac58d0d6bc54c91eee2e3fdc513f9c23_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac58d0d6bc54c91eee2e3fdc513f9c23_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
ac58d0d6bc54c91eee2e3fdc513f9c23
-
SHA1
1c88e744fc3ad06541890602722e51cca128c84a
-
SHA256
6038c249c3cfbea1be34ce10ea2558211204f388a548d1702698e6b38a2d2adc
-
SHA512
904061da4fc65ca73a198969521cfc2c65ed5e99a99f5895a12e06cf62302e6babd7ad83ae938e925615a7e297109b26cfa03c25bb807037a76b41a0d29c533d
-
SSDEEP
24576:ycPe62YfoN6UcAzdCwEIfYdkldH7OtunPxklce8mRs8PGo42s:yu2QoNLzQlIfZdHdnPxO8mRst2s
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac58d0d6bc54c91eee2e3fdc513f9c23_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4864 ac58d0d6bc54c91eee2e3fdc513f9c23_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4864 ac58d0d6bc54c91eee2e3fdc513f9c23_JaffaCakes118.exe 4864 ac58d0d6bc54c91eee2e3fdc513f9c23_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac58d0d6bc54c91eee2e3fdc513f9c23_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac58d0d6bc54c91eee2e3fdc513f9c23_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4864