Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 07:00
Static task
static1
Behavioral task
behavioral1
Sample
be1b38bc0262caa5f29756096a579dce_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
be1b38bc0262caa5f29756096a579dce_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
be1b38bc0262caa5f29756096a579dce_JaffaCakes118.exe
-
Size
3.2MB
-
MD5
be1b38bc0262caa5f29756096a579dce
-
SHA1
29dde8100343a1d5a2d436477172ec873da17ce8
-
SHA256
da9df40cc6264a35e04de01654e99367d407f62a22b3f55ea8d4ba336279c4cd
-
SHA512
41c8b647ae34e3712edeef0ec58a6ad0f2c1ad750a26396f67b3f46ba50ed33240e4d6537506166ca1f439e22ecf824dc47ba0797fd9adddfa1a22f2adb25930
-
SSDEEP
49152:Katm9S3qP3mF/p/Cxw8vS0zcF1vYVzH9RG327XaEkww:K703U3BW8K0AF1vYVb9V7vjw
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3448 be1b38bc0262caa5f29756096a579dce_JaffaCakes118.exe 3448 be1b38bc0262caa5f29756096a579dce_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be1b38bc0262caa5f29756096a579dce_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3448 be1b38bc0262caa5f29756096a579dce_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 464 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 464 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3448 be1b38bc0262caa5f29756096a579dce_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3448 wrote to memory of 848 3448 be1b38bc0262caa5f29756096a579dce_JaffaCakes118.exe 95 PID 3448 wrote to memory of 848 3448 be1b38bc0262caa5f29756096a579dce_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\be1b38bc0262caa5f29756096a579dce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be1b38bc0262caa5f29756096a579dce_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:848
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:404
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x150 0x4ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD574529599302a2e09c30b1e119a0709f2
SHA15990f60194ecafaf43340e44657d224f8d5682eb
SHA256edfc5f86be36c2c509e4ad6ba3742bb5b2429a56de805a99771e24fec62b076a
SHA51225d1c2bc15f5d20f3d69a2c20727e4e2cbb7086aa18ec535eea2a5766302b031c12b9139467b717537300e1497102b387dcc3f53ca5ff11f5301de672efe4b07
-
Filesize
34KB
MD5ea166838c6dbff4e6ac5fc3fbec64fa9
SHA1ca52ea97701f7d8ff0f078a55c8caaed98b017ee
SHA256cc27ce110f984b3d3edcc40c70b2c12ac5a8f47dae300b72d8d27924208f25ba
SHA512046bb0b2a390486e66d082d39131019d5224acc0ac47eed490948b314b57750abae7eddf04fc15ff3361be72e667c588b81ee9b183e1a633f51e2fbaa347708b