Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
b598dc87e42cb68ff5236db27cc4df92_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b598dc87e42cb68ff5236db27cc4df92_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b598dc87e42cb68ff5236db27cc4df92_JaffaCakes118.exe
-
Size
48KB
-
MD5
b598dc87e42cb68ff5236db27cc4df92
-
SHA1
e89ee2dab871d9d8e025e046de517c0c10010788
-
SHA256
1786b53f51cebca8e8bdf65640e2011ca2c767454c7949931b5f9ccac8f2e214
-
SHA512
85829f606750ea24d7804590de41bf35305f3c785db213dc48eb22af02f907e351c10d9d79a024f3c392e0f46b71e52f5c04b22c06307518368c0d434fbacb82
-
SSDEEP
768:4yKoNLsn4Jp9ZvRInygrpMoZN+WtOl08j74EHCDwBLpZTPCUvQCy:j/sn4/OycxZN+MK7o8t9zQ/
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\spool = "\"E:\\Windows\\system32\\dllcache\\spoolsvd.exe\"" b598dc87e42cb68ff5236db27cc4df92_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\blknt = "\"C:\\Windows\\inf\\svchost.exe\"" b598dc87e42cb68ff5236db27cc4df92_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b598dc87e42cb68ff5236db27cc4df92_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 1624 b598dc87e42cb68ff5236db27cc4df92_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b598dc87e42cb68ff5236db27cc4df92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b598dc87e42cb68ff5236db27cc4df92_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1624