Analysis
-
max time kernel
135s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
b717d8e97afbfaabb7c47f2048ee70ba
-
SHA1
e742ad0fe80e437f322853fe0073e292b15920d6
-
SHA256
eb6d77ebafefcdc97c9e93533bfbf8ee4af5f238308e20cb983051218828d426
-
SHA512
0f8f0d145ed9fe3d9cc33d7f28287f1f5e251e79587912af03780b3d5d9625d81c9750c1f73b140222bac278401b31dad34ecf0d6fe434732cd8e96b372f4b95
-
SSDEEP
24576:lRg+KPS0nf3dcX/up0khTz6SH5+eZmoWqWG6wR4/PE/aG1Z7uPjvMfWRRYw/XG5W:lRySS3dcmp7h7kkuTwNdZoJRiyXGo
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Services = "C:\\Windows\\FrWall.exe" b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 4672 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1924 b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1924 b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe Token: SeDebugPrivilege 4672 taskkill.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1924 b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe 1924 b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe 1924 b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe 1924 b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1924 wrote to memory of 4672 1924 b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe 92 PID 1924 wrote to memory of 4672 1924 b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe 92 PID 1924 wrote to memory of 4672 1924 b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b717d8e97afbfaabb7c47f2048ee70ba_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im ashMaiSv.exe -im mcvsftsn.exe -im Mcdetect.exe -im McTskshd.exe -im mcvsshld.exe -im McVSEscn.exe -im McShield.exe -im mcagent.exe -im oasclnt.exe -im nod32kui.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1516,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4628 /prefetch:81⤵PID:3476