Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 16:02
Static task
static1
Behavioral task
behavioral1
Sample
c92621b96d81ceda323100409b173224_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c92621b96d81ceda323100409b173224_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c92621b96d81ceda323100409b173224_JaffaCakes118.exe
-
Size
198KB
-
MD5
c92621b96d81ceda323100409b173224
-
SHA1
2d266afdb07e28eb6b4dc5414c65aa9e071f19e7
-
SHA256
bdf3790c8b36caf93702966b6e790379f12179aae2291dea6d50062fee39b308
-
SHA512
7f074c94c6e26da7077703bb72be97f8db438e6aba6a632189d09a461be6e302acbfd6edd8aabf8c418918b65c305ff6ec09fe4d6b34ba6bbee9aac1100645f0
-
SSDEEP
3072:Nw1FQ+jW6GgmZZMSMNVtrvulngnMwNCmm08RD76YAK8tTBfV4Tq49oPX:iFjWjbghvupgMCCvuttTBN949oPX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2296 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1572 ArbiterSvc.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Arbiter\ArbiterSvc.exe c92621b96d81ceda323100409b173224_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c92621b96d81ceda323100409b173224_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ArbiterSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 472 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2224 c92621b96d81ceda323100409b173224_JaffaCakes118.exe Token: SeDebugPrivilege 1572 ArbiterSvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2296 2224 c92621b96d81ceda323100409b173224_JaffaCakes118.exe 29 PID 2224 wrote to memory of 2296 2224 c92621b96d81ceda323100409b173224_JaffaCakes118.exe 29 PID 2224 wrote to memory of 2296 2224 c92621b96d81ceda323100409b173224_JaffaCakes118.exe 29 PID 2224 wrote to memory of 2296 2224 c92621b96d81ceda323100409b173224_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c92621b96d81ceda323100409b173224_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c92621b96d81ceda323100409b173224_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\C92621~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Windows\SysWOW64\Arbiter\ArbiterSvc.exeC:\Windows\SysWOW64\Arbiter\ArbiterSvc.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5c73bb0a7380515550e8de3275d5f6fd6
SHA1f56e278e11e81c67bf3f9d9bc6eaaa9191d560a5
SHA25689f3e766486f5aeb72ae3ef21e4aa478b83f59e349e95c48802a49c6a2739afc
SHA51203bef5d727b97f4ab22d188206def203c458b069a4efb8ceda0b5898ca97be0f20904889c982be060b84864d9cc0868e4c4c1a41fda64df53cf8dcb939d75ad9