Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 00:51
Static task
static1
Behavioral task
behavioral1
Sample
b1894545b252b7cbccbb2dd078e4b398_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b1894545b252b7cbccbb2dd078e4b398_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b1894545b252b7cbccbb2dd078e4b398_JaffaCakes118.exe
-
Size
66KB
-
MD5
b1894545b252b7cbccbb2dd078e4b398
-
SHA1
f269c3bd242ed796415622bbd5e3f91f377c2fce
-
SHA256
a42b345c720f34f9ae5a5402a13243dcdf682dff0c16d96bbed5aee44a6a358d
-
SHA512
0693baa7b2046c03b9556ade37392ef8633d4d13f6c5a9fb2f163c753da41bddf7450a6aeb59469629f175b198887ec5817758f9e73aefe14f9003cb3f37690a
-
SSDEEP
1536:I3nxidg144MlrAWYOGDRq0w0jUjnF4W5:IX11CPqRq0BjUjnv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4448 CbEvtSvc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CbEvtSvc.exe b1894545b252b7cbccbb2dd078e4b398_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\CbEvtSvc.exe b1894545b252b7cbccbb2dd078e4b398_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1894545b252b7cbccbb2dd078e4b398_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CbEvtSvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 836 b1894545b252b7cbccbb2dd078e4b398_JaffaCakes118.exe Token: SeLoadDriverPrivilege 4448 CbEvtSvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1894545b252b7cbccbb2dd078e4b398_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b1894545b252b7cbccbb2dd078e4b398_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:836
-
C:\Windows\SysWOW64\CbEvtSvc.exeC:\Windows\SysWOW64\CbEvtSvc.exe -k netsvcs1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5b1894545b252b7cbccbb2dd078e4b398
SHA1f269c3bd242ed796415622bbd5e3f91f377c2fce
SHA256a42b345c720f34f9ae5a5402a13243dcdf682dff0c16d96bbed5aee44a6a358d
SHA5120693baa7b2046c03b9556ade37392ef8633d4d13f6c5a9fb2f163c753da41bddf7450a6aeb59469629f175b198887ec5817758f9e73aefe14f9003cb3f37690a