Analysis
-
max time kernel
140s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 06:15
Behavioral task
behavioral1
Sample
b26226f10b8194502031a454b39c8156_JaffaCakes118.exe
Resource
win7-20240704-en
2 signatures
150 seconds
General
-
Target
b26226f10b8194502031a454b39c8156_JaffaCakes118.exe
-
Size
43KB
-
MD5
b26226f10b8194502031a454b39c8156
-
SHA1
e643ae34bf7cf12ebe787b274abfbc406231b322
-
SHA256
4580903ddae554717b3289654cabd35e8cdb8f171d538538aad71122a3e68299
-
SHA512
f58f831bef4c94511bb4e600b2847bae54f646a638140a1f7b883dc0324c2592f6ce42972f0b7adc215739539627f8b16c9c6365358066878a0d9dcac6d8490c
-
SSDEEP
768:tSwYyq0ZAz5mcL+nBzyvFKVfn+uCUIi8z/LUkVcXGC:tR/+sG+BzgWfn+CIwGcXx
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2132-0-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-1-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-2-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-3-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-4-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-5-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-6-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-7-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-8-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-9-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-10-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-11-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-12-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-13-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-14-0x0000000000010000-0x0000000000041000-memory.dmp upx behavioral2/memory/2132-15-0x0000000000010000-0x0000000000041000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b26226f10b8194502031a454b39c8156_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4960 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4960 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b26226f10b8194502031a454b39c8156_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b26226f10b8194502031a454b39c8156_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2132
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ec 0x2f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4412,i,11708048364682646792,608099842549576907,262144 --variations-seed-version --mojo-platform-channel-handle=3892 /prefetch:81⤵PID:1580