Analysis
-
max time kernel
31s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
b64080701b84864d998c3747e5f9d6b3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b64080701b84864d998c3747e5f9d6b3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b64080701b84864d998c3747e5f9d6b3_JaffaCakes118.exe
-
Size
799KB
-
MD5
b64080701b84864d998c3747e5f9d6b3
-
SHA1
8405c58fadcbbd73cb6a314b7c702d460b69fd86
-
SHA256
ae16649773b8102f857ac888c6fbea94289a5e3b3e3ae31ed127188326968ef1
-
SHA512
5c4ab88d52919233bdc2420d162613cbfe7d17381d8fa0d6d5d8866375b59ed405eb5040d01349d93ab8c3ce7b3a9dd11ed5a6e1d27465e63b1b847cbe27c332
-
SSDEEP
24576:0rxKTn26s1Km+rxKTn26s1Km7rxKTn26s1Km:OxKj26aKTxKj26aKexKj26aK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b64080701b84864d998c3747e5f9d6b3_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1740 b64080701b84864d998c3747e5f9d6b3_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1740 b64080701b84864d998c3747e5f9d6b3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1368 1740 b64080701b84864d998c3747e5f9d6b3_JaffaCakes118.exe 30 PID 1740 wrote to memory of 1368 1740 b64080701b84864d998c3747e5f9d6b3_JaffaCakes118.exe 30 PID 1740 wrote to memory of 1368 1740 b64080701b84864d998c3747e5f9d6b3_JaffaCakes118.exe 30 PID 1740 wrote to memory of 1368 1740 b64080701b84864d998c3747e5f9d6b3_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2960 1368 csc.exe 32 PID 1368 wrote to memory of 2960 1368 csc.exe 32 PID 1368 wrote to memory of 2960 1368 csc.exe 32 PID 1368 wrote to memory of 2960 1368 csc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b64080701b84864d998c3747e5f9d6b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b64080701b84864d998c3747e5f9d6b3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\bamqfisl.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC6C9.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCC6C8.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54645208e33618200710b3d22d49ea265
SHA10095cc26f542b64f54f3bd8a8e47bbb7dac16783
SHA256aef29cf4a964d594060f4e7e822399c3cb1a8df2a6be2005170e9bdd17828137
SHA512530dc5b3ef571624882a0e889f0a6cfcfd44b1431efc79a8c1034e67787c20178bc1b412f62c875df7b3a220b2e0ccfc46cf8723aa9ce398f15fdee1dafd5500
-
Filesize
112KB
MD58e253aade1daca1caa44cd5d1c75433d
SHA1d17bd645e3fe363b98e8271f677740d80e241598
SHA25605eb5488f997208cd9aefd20ee152464b8df1af16f4cfaa405223c0b0af00f1b
SHA512c5013e49e4ce260528bb4c522e7c82615a81828d5b508001eee6fccb46af97e61fa0b3ffe9a95264c6451d1a516781878c92d60b8b785d1764308b4fbe5f07ec
-
Filesize
652B
MD5df73b893f38115acfb56e79bc68057bb
SHA197ac9f13dd423c37e527011c54f47dd9f7f81783
SHA25663a4a2ccdb99169528fef8cbb805e3d32ecabd5fbad915ed34ec2a4294ead93f
SHA512f40e0bfd4ca2c5226d4f0f9550aa10bf0b1c9b2ae940c4709106a13226572901f0421952726d381727ec383e0c7e7c6d5bf47373a9cc3d4e2c24260c803ed98b
-
Filesize
232KB
MD503be742e619e1248a26113cdfee5507b
SHA1d69c4ab03edaf91fa058c48658246b40c4123d22
SHA256624a280884c3c5a60ba7acdb927bcf102951f9ad33b4f094f09ed0a2277c0783
SHA5121d8ef9da93bb56cba3c0667e18e264ebdf22736170780e300902a7193d6672f443036bd85570834c3da4d9a2ca971c5896392aadb45c35dd7094cc354852b982
-
Filesize
619B
MD581d4fe111988346075a01fc16e1bd25e
SHA1750bc2c89e13a671178f82bb28077521811f4da0
SHA2569f70b945b08a3360e254be2e13afc556397cb0fcc041479cac38f0c51cf89916
SHA5127bff7586c42f4b47f57acd1dba29a54bdad77e234a00db2164a8e4f2d8cebfcdf581cdf71bee338f4e98ebd215dde1829cfc9ec535471f8926c8b3734cd96982