Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe
-
Size
200KB
-
MD5
d103984e144c7bc80be97c794dd8d8df
-
SHA1
5a941d9e1f111167f5f2b64f64c0bdefbe46e0a0
-
SHA256
24d7007c0c8f7696724e2aff1316aef9f83133c06011d03cdee7913551104f21
-
SHA512
d5d2d53f62d2db9e395732a2d6758da508721eed8e5aa23f3983ee7e569507aeaf3961da49ea5be0f94c5113108ca35b3bd66972506585f140f17cd867a21548
-
SSDEEP
1536:TKbc4umMqVx2L4YetGTnt/zcmAHcvxIsL9Yzcs0fMydWRyuTV7TJ3:T2fbntMBzcf8pIQ0PydwyuTVPJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2256 pxs907D.tmp -
Loads dropped DLL 2 IoCs
pid Process 588 d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe 588 d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxs907D.tmp -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSystemtimePrivilege 588 d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe Token: SeSecurityPrivilege 588 d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe Token: SeSystemtimePrivilege 588 d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe Token: SeSystemtimePrivilege 588 d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2256 pxs907D.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 588 wrote to memory of 2256 588 d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe 30 PID 588 wrote to memory of 2256 588 d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe 30 PID 588 wrote to memory of 2256 588 d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe 30 PID 588 wrote to memory of 2256 588 d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d103984e144c7bc80be97c794dd8d8df_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\pxs907D.tmpC:\Users\Admin\AppData\Local\Temp\pxs907D.tmp2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5029a7b4728a2f1c6a524c677d18ec1ae
SHA17055fd4e6a22bd13b87a815a2ac3b4f3da8a40ee
SHA25674a250640d4887159475747817b01a68e7fb79b8cf8aa07863c1dafa95a8c736
SHA512975fab6b48e28445e8ed69ff8eaec0ee615506b73256d7a3aba8615383c3a125c8f6a7d412b853f8b5edae2a3872f0a4c7eaab45cbd76c8386562fd524c4793e