Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 04:49
Static task
static1
Behavioral task
behavioral1
Sample
ceb2108e207b539f9af3af3a27eb9a67_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ceb2108e207b539f9af3af3a27eb9a67_JaffaCakes118.exe
-
Size
709KB
-
MD5
ceb2108e207b539f9af3af3a27eb9a67
-
SHA1
74b98c11ce320a209db157f39dd63ae432fff6c1
-
SHA256
1533c8b8e0110f18668aa2b4c85bbfd8fc10ed0c7dc34c6a40ce94d7e8ffa368
-
SHA512
067060c068df0cf38ed04f85f5c1d9edd224c6d902282115d275efd522c1824c3f3e245af43df7f4b6b02c0195c718b1320e940a895e8854ae412a19ca37046b
-
SSDEEP
12288:4DKvp4EfCWAjcJMC/eAqwOf0B4WgwziVKOxOubuDYec/ns11+VXYJglR:4WvzfP/eAdS0awzAkuNts3EYJG
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1976-3-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-1-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-4-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-103-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-104-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-106-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-105-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-107-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-146-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-147-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-149-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-173-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-170-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-169-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-168-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-174-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-175-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-176-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-177-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-180-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-181-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-182-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-183-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-184-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-185-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-186-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx behavioral1/memory/1976-187-0x0000000001D50000-0x0000000001E9E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceb2108e207b539f9af3af3a27eb9a67_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main ceb2108e207b539f9af3af3a27eb9a67_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1976 ceb2108e207b539f9af3af3a27eb9a67_JaffaCakes118.exe 1976 ceb2108e207b539f9af3af3a27eb9a67_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1976 ceb2108e207b539f9af3af3a27eb9a67_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1976 ceb2108e207b539f9af3af3a27eb9a67_JaffaCakes118.exe 1976 ceb2108e207b539f9af3af3a27eb9a67_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceb2108e207b539f9af3af3a27eb9a67_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ceb2108e207b539f9af3af3a27eb9a67_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
8KB
MD562006bf5a34b37b218c4ea14bc1bdce1
SHA1ca1c6d534b9a9b350ea0ae22553beb87517fd3db
SHA25669b83d2e8d943649c028ffc370f85bf0b3083f79196391d28395b663c7be6443
SHA512743b8e9cab8e3dcceb1d27507f1f1cb57a79a867d3a80d090a7f65393a34cbedbded5bde7f6b2f998ed50e7f3b6792392aac7021f377da3d5df52648c76a0a6d
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
15KB
MD56e085401c326730390a14f0eb72d00be
SHA134cbfc25bc54ca71141f140304e6ee3a83a2b6df
SHA2565dc267aed7194615d4554dfc0b58c98054f8b3bf726d44f44cd27db6dde2fa72
SHA5129e9774151f34679fc5ae30068f8049be2c4472c602fd3bdb97ae4e00d644deb60313b756f6b5aa5af37abadccf45180edb866c1369f1960675588d632611c057
-
Filesize
1KB
MD54d9e933d65430337e6f65b40a0769313
SHA17386eceb41e54e714f5c28f8b65840acf49f4bd8
SHA256fb1a4307a533b33fab2aa739cb31913d3398fe60d4b0cb25247cc5fd11feaa76
SHA5122c4977e16404e459048ffb7848882e1f754f5505dcbf226bf2007e404e8a3e8aa27168be44cbc8c705d85488849ea31ab3ec615562b1ce1a351553219a228a01
-
Filesize
1KB
MD5db2626f82130a76ce73af77f987532ac
SHA1e3fc5812199105d33619d3af587c315cbc45dae7
SHA256393389a223a19a3d5a3b2fa84f2ee0aa27dc945802641a2764bb8ad1f1ee2b98
SHA512bb5490b2b0460cfafa721a9f00b95115ea9fd3ae133637fe7567e932abccf5d625717817931e353760e4a89edc633a38e0c663a9e213f231b1b809af27146fae
-
Filesize
2KB
MD510bd02c03eea4d81d964e48ab7ca57c0
SHA1adac6b648f7fe8db31936d87e5749e2825668926
SHA256b4b5f7345d25fa3179e0e02858999f30aad5e43e8641c81a900497d3d7a1aedf
SHA5123ef2c5e16b85c9240cf258cd0be812a73386e90ac94d95a21b73e6140e11b88c8c9c370f5270afae719b10ef65c64751f0fb2935150e825cd8600b36cd7f601b
-
Filesize
2KB
MD59f711b1f8375d8d1f2cb1587ac0eeec6
SHA17b8c097880890ac5f7c08fcba0c5b4415c70f4bd
SHA256bb19dc0524f32f70d4a7164e602c7a0f9b0e82966ed87838d5ec664502d8fb26
SHA51274c85e6dbaaa12bf6b63975809f70f66fa875cd7f91f1c00e1f452dcdc8c13d25a3f522415cbd569d5b8445348d1e5d9ba36a0def8eda0de38c27ec2763f579a
-
Filesize
2KB
MD59ff6c8092a3d13d8d04f7c9c68ddd1dd
SHA18689e9ecf2d80e43916c0b6d5df6dbe61c480701
SHA2566210c04f880b33e17686e38ccd570e97333fa26236ef507d963dcffd409ae313
SHA5121d352651e93b671e69bc10c382813c42b4631185470385e095b8923c93dd34434b134df44685627098f98eeb357d5ce7f6cff79ba8e7e1a6d4863b8848956a53
-
Filesize
10KB
MD557ca1a2085d82f0574e3ef740b9a5ead
SHA12974f4bf37231205a256f2648189a461e74869c0
SHA256476a7b1085cc64de1c0eb74a6776fa8385d57eb18774f199df83fc4d7bbcc24e
SHA5122d50b9095d06ffd15eeeccf0eb438026ca8d09ba57141fed87a60edd2384e2139320fb5539144a2f16de885c49b0919a93690974f32b73654debca01d9d7d55c
-
Filesize
577B
MD584b37cb510f50c8fea812eb308d3f03f
SHA1d141a79feb407506709f051e55c55438a12fd3b4
SHA2567bf800336671204de36b7d1f6ceffdff830040f51d21bc44f220f68d72cf492b
SHA5123222cb5772a4e9b20de253914c0856c7e6383567df68fcf287801f6f79248f65957515e7ec4a44db1fbe910afeae8ca3349295c4bdf03df6aabde36f2aaa6b5e
-
Filesize
104B
MD535a600a752d3074501de31a516860499
SHA151eac62cf77a0b88a3e9cb9ee6f85def21fd4bcf
SHA25614e064857751b23da7bbe40861ef4caf99b2496227507b8e3108fbac6d901f75
SHA512046ec179571d239bfb2d51be9837f96d9afebf2e5db77bba0f4a25ce8716d37581a3f9753bd2dbb04c47711699a9d93987bceb71df0b8becf8c577d660320069
-
Filesize
1KB
MD599831aa45687058e1092c0267938f057
SHA18640fea8c577fed87628c1a164f3d74b3661c948
SHA256a5255dd027119fb3096eef8a7f9ce900414203327ff0e38ed670a41d1c5e78d0
SHA5129262855232cab942ca94c540bdc3bc30eefd94c4c01defe4192786f04bdc2a8a2a2bbb7149f09a63c8c3a67145940ecff3122e7226a64f1f763c9a94f3e2c5cc
-
Filesize
718B
MD59d31583bcfad58a6b9ddeaf44549a5e6
SHA198f4c693af708e02201de2aee31fe094dc3b0a9c
SHA256e466a2db2f755d9eb68619439af37ff4e45559b7a3f476e226ab2a11aeadae1a
SHA5129ddaaad53375f4d2874fe5c98b6782202d2bd975cdd9363796986dc7567368b94d9ec1aa3e839194097838b787bbd71d574540cf5b04fd04f10fa80d6a89e695
-
Filesize
19KB
MD570e70599d4b853df0f12f6cb0e04695f
SHA16e3a721aef65625bf99b639800476150d262dd4b
SHA25687af4027e8f89459463bdd73df7b928b883eefb20514159d3a1a4be0d39e00c0
SHA5121efcf8af09cf857b3850cec43a88fc8c0992e3b04f78ad2c71b84c2ac7775e745df211582694588b29217aefb1ae02b29b94c2cfe52b5d32bdafb9dce73b9920
-
Filesize
27KB
MD51cc2677e3e29e45e538985839cff2b42
SHA12dab653eb20be72b034a38dc1fcebbd18f079c86
SHA2569216d98a6574dfadacdc8321dc435454cb72c589b3ee8326a9b946966f756d7f
SHA51225575fea9abb1491b5a5853244a9b655ce05f64d98f4b79134674f2d9a560a5af405c1783c9da4a07cfb38b51d060c7a70890c70df6c1c8f4b01e041aa4f649f
-
Filesize
2KB
MD5e3758d529f93fee4807f5ea95fbc1a6c
SHA13a9a1ba234e613e5f808c3ffeda05a10a5dafe00
SHA2568d46eb0c60043dcb7d79ab3d0525148fc901764620c02e4b9c5dd8b0e9026303
SHA512e891552bee3aa10247cad1fcc510331077016a6e71d46827be2dd46017f943c5acc2c1506b41217880d35d52a94989923ad0a345f8791da4bb379eceefe3c407
-
Filesize
4KB
MD583c38f4e0abd0b40ea8aa017e45bfe1c
SHA1834ac428f542ce1ce9c2f61104e2c57290f1af43
SHA256400bbfbe8438ce6602d9f874919c0db169e11de0209c60b8f3244b170e0e5929
SHA5121298eda8c51fd651e588168738d1e4e29a2cfb4dc701f1be47fc9b96da8cda23440cf4785afeec48724f9bcd4b6d98c6cf99edcfa141457f46a52b43843d3c16