Analysis
-
max time kernel
132s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
b51b840c63165ef706fbf74b83f78eca_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
b51b840c63165ef706fbf74b83f78eca_JaffaCakes118.exe
-
Size
136KB
-
MD5
b51b840c63165ef706fbf74b83f78eca
-
SHA1
53db1b288329c071216097b47a318e79fd6a459f
-
SHA256
6358e7e5e7e76b97be2acabe8557e4a37a36d4f9964cd4789742955dc4076a22
-
SHA512
df84afb8296ef42eaaf5a5c6f9d4e9ae581470f0208e4fa132608e64140ddc1472e8b7780b7411a1d13d473a35b7b7a72213ba9a81ca5e6f313041d51f7131b3
-
SSDEEP
3072:oOS8Sh3lJmDIKbLAxq2vBnccVA7cdaYPRzxdVsnPkQadqeqMp:oX8S9mDIsSqTW2cdaYVxTsnHadqeNp
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x001100000001e4fb-5.dat aspack_v212_v242 -
Loads dropped DLL 2 IoCs
pid Process 5036 b51b840c63165ef706fbf74b83f78eca_JaffaCakes118.exe 5036 b51b840c63165ef706fbf74b83f78eca_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sporder.dll b51b840c63165ef706fbf74b83f78eca_JaffaCakes118.exe File created C:\Windows\SysWOW64\advap.dll b51b840c63165ef706fbf74b83f78eca_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b51b840c63165ef706fbf74b83f78eca_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 5036 b51b840c63165ef706fbf74b83f78eca_JaffaCakes118.exe 636 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 5036 b51b840c63165ef706fbf74b83f78eca_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5036 b51b840c63165ef706fbf74b83f78eca_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b51b840c63165ef706fbf74b83f78eca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b51b840c63165ef706fbf74b83f78eca_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD59399670daea470317c6565655a1f74d1
SHA199b8717add687a8556b393467027b7e150fbe6b1
SHA256480a7ee7ff84c4912a905c4761e9e1324aa40f2e0de9faec883933577d197a86
SHA5126411d93cbd16ea777fbd8ea8dc879d90e4cdabaaf7a033e1a35ce6b07fa569d03771ecb7a6d98068b8fcf992ac0df85e1425716262a2ff303ca8e6ccf5860ec9
-
Filesize
8KB
MD5a082e5473b2a9a4d846ed7ddf637ac76
SHA11703f7969a6e76f8458eda3e8e40fd115c0bfdc3
SHA25673f7171c2af70ccf8ee4c49626fb456807a6a668f6a967298dcd5ed29773bd2a
SHA512abc1ea5a46d0784db23ddd9bd984527913c3e40a3896cfa43e9f4f999e4064038b24aed78e27bf2e705c8c55482e801f520987c2a74be6f01edc32df3d235eaa