Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 09:59
Behavioral task
behavioral1
Sample
c07d9e71aacaaa9022d36a58134785a7_JaffaCakes118.exe
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
General
-
Target
c07d9e71aacaaa9022d36a58134785a7_JaffaCakes118.exe
-
Size
531KB
-
MD5
c07d9e71aacaaa9022d36a58134785a7
-
SHA1
64b73c36df80274be9d062c11775c8b56d78a96b
-
SHA256
304339d4b80c079ab4bcf379c5d89348efb11fa99bfd03e3e9ee2f4df43dfd41
-
SHA512
ccf894bd60c598b3279c6167d384ca2a958f717008d018a1777331a0bf2f56c84813f1498ea6fb5b93aa170e26c114ac693ccc38490bb716afebaeaae174ef70
-
SSDEEP
12288:EachqEbC3hAXk8CCGdzy/AVCj2gLMw4zYnokfTEX13f:0jchA03dzy/AqoYnowTEB
Malware Config
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/2240-1-0x0000000000160000-0x00000000001EA000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 api.ipify.org -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c07d9e71aacaaa9022d36a58134785a7_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2240 c07d9e71aacaaa9022d36a58134785a7_JaffaCakes118.exe