Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 23:23
Behavioral task
behavioral1
Sample
c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe
-
Size
311KB
-
MD5
c1ce97e677c3c51b99da3c233e59b037
-
SHA1
62307fb8e571916a63a85f5cc5f2c130d1f2b192
-
SHA256
31a9a2fca390d209be694c73c8a573d4825cf410340e6b544f86ece2a3c3d15b
-
SHA512
7d86d6c36ef79b4613c5f100aa1e3cb364d0028516ac4104a1acd05743d64e8b60797f34f818a0c9ecc00283ef7f303283ba3cde1bb4e1add5f5a4d2361024a3
-
SSDEEP
6144:BUi/CSa3TTzt8rJuPecnZT1QYy2MeQr+KEXzlFTz3HOL/sBBTA:LCxnzKCNq/2MeQrZozjzuzST
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 780 ping.exe 304 ping.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TacOnlyOne c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\TacOnlyOne\G-Buster Browser Defense - Service = "459152" c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 780 ping.exe 304 ping.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2752 c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2752 c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2752 c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe 2752 c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe 2752 c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2752 wrote to memory of 780 2752 c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe 31 PID 2752 wrote to memory of 780 2752 c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe 31 PID 2752 wrote to memory of 780 2752 c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe 31 PID 2752 wrote to memory of 780 2752 c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe 31 PID 2752 wrote to memory of 304 2752 c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe 33 PID 2752 wrote to memory of 304 2752 c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe 33 PID 2752 wrote to memory of 304 2752 c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe 33 PID 2752 wrote to memory of 304 2752 c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1ce97e677c3c51b99da3c233e59b037_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\ping.exeping -n 1 www.uol.com.br2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:780
-
-
C:\Windows\SysWOW64\ping.exeping -n 1 www.uol.com.br2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:304
-