Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 15:28
Static task
static1
Behavioral task
behavioral1
Sample
afc6c168d58cbd3ad224fd96ca077058_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
afc6c168d58cbd3ad224fd96ca077058_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
afc6c168d58cbd3ad224fd96ca077058_JaffaCakes118.exe
-
Size
1012KB
-
MD5
afc6c168d58cbd3ad224fd96ca077058
-
SHA1
8e9bc17a25c8a052f407c2e2282ad2068c2a4904
-
SHA256
2a17eaac08d2b298198c0864f26780fcb1856e62c496945004f65acd031365ea
-
SHA512
425597e63c50dad92c9cdcb5cb752c1f58ed79c6facfcba9a240393565f0798bbcc0d0ceacaf947c21ff06b34cb7ad8eef7d4902eef9475c04d6442224fd845d
-
SSDEEP
24576:Ww4OV2P++hd7EK3PMYYtkyBVOitwblfCJBg:WwpYOK3PMVtkySiK6
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2304 afc6c168d58cbd3ad224fd96ca077058_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afc6c168d58cbd3ad224fd96ca077058_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2304 afc6c168d58cbd3ad224fd96ca077058_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1692 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1692 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\afc6c168d58cbd3ad224fd96ca077058_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\afc6c168d58cbd3ad224fd96ca077058_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2304
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ac 0x3841⤵
- Suspicious use of AdjustPrivilegeToken
PID:1692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5fedd2cea478da0d6d9d6799d4ec350af
SHA1150a3e20173f84afad54652233f4fca9a545d9f5
SHA2564e7b44ecfada6d59290b28ad5262a686e34ebf50ac859493c511bba18f38ad06
SHA512123ef3d85fec64962db8bcef96116f240fad919c8dddb802d3ed78d34aea60c4ca518b620c89da1e7b4d85dcbcd6524a7bcf3924488a53376130152ab940c898
-
Filesize
1KB
MD5927367fa6afc728d6cab2df0977f9f64
SHA119bd6cda458b3d6b4c1d9251aa00a0ea0a7066b1
SHA25637091ce95a311d1e10b7d9365aadad37c90d1304d4f61a33df4f980ca718ba42
SHA512ddc60542b3eca0b96fa5bc5c883c303638c1f4ce9d66d0d6c6c5c995c24a199da7b3ccdc5c5d82987ba7bc5b7e88eab28cd4568384be4fe201b3db749c344c6b