Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 09:48
Static task
static1
Behavioral task
behavioral1
Sample
d4136640802ea7a27bcaef25a8b21420_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d4136640802ea7a27bcaef25a8b21420_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4136640802ea7a27bcaef25a8b21420_JaffaCakes118.exe
-
Size
84KB
-
MD5
d4136640802ea7a27bcaef25a8b21420
-
SHA1
44034b69dd5eaa8160c72b1274e76bc9dd1897d4
-
SHA256
333306db775fa5e86277fe90c0d393a1d446e75bf29fed6dec0f08d9a4872516
-
SHA512
2f49c32d7e44e23e20bfa9636443e9e4ac330dd5d2e4cf4e80b511f5c9f1e1e7970ca741a382f0b617a4c46e7f7aec2c1b1f8d8919d545db5c023855766501f6
-
SSDEEP
1536:O+KL6C9sPJa8aAxP1g3vWvVz1+KL6C9sPJa8aAxPU8G:uZsPJ5xPSvuTZsPJ5xPU5
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Currency = "c:\\autohot.exe" d4136640802ea7a27bcaef25a8b21420_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4136640802ea7a27bcaef25a8b21420_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2384 d4136640802ea7a27bcaef25a8b21420_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2384 d4136640802ea7a27bcaef25a8b21420_JaffaCakes118.exe 2384 d4136640802ea7a27bcaef25a8b21420_JaffaCakes118.exe 2384 d4136640802ea7a27bcaef25a8b21420_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4136640802ea7a27bcaef25a8b21420_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4136640802ea7a27bcaef25a8b21420_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2384