Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe
-
Size
65KB
-
MD5
d4f6f0954fd0d5147ed10518921eef44
-
SHA1
ed4831e790f7c2c09719bdc97e3fdef1d36a1b03
-
SHA256
eaca0cb0365f748cc16895185183af4a67778a2cd6eb7ee8c2b5af3a4ea4d0ef
-
SHA512
2d1bd3738f076495068e1563f258d7279a904edb5a4a6359607858edcef4f962504896608e16f4c91bcbc99ea3bf8df92c659c9d890ab1cacd79cfea3347734f
-
SSDEEP
768:5BsypoWmwu+xxDqRQAfTFFLffkYs/g79W7iJzl627SLt8gLOU2FHD+mJ3VseN5Ct:XBoWdHaDLw7iJvu+gFEJah1B+ILaxsq2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 2776 rundll32.exe Token: SeRestorePrivilege 2776 rundll32.exe Token: SeRestorePrivilege 2776 rundll32.exe Token: SeRestorePrivilege 2776 rundll32.exe Token: SeRestorePrivilege 2776 rundll32.exe Token: SeRestorePrivilege 2776 rundll32.exe Token: SeRestorePrivilege 2776 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2656 2660 d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2656 2660 d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2656 2660 d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2656 2660 d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2776 2656 cmd.exe 32 PID 2656 wrote to memory of 2776 2656 cmd.exe 32 PID 2656 wrote to memory of 2776 2656 cmd.exe 32 PID 2656 wrote to memory of 2776 2656 cmd.exe 32 PID 2656 wrote to memory of 2776 2656 cmd.exe 32 PID 2656 wrote to memory of 2776 2656 cmd.exe 32 PID 2656 wrote to memory of 2776 2656 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt48870.CMD "C:\Users\Admin\AppData\Local\Temp\d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\rundll32.exerundll32 setupapi,InstallHinfSection DefaultInstall 132 .\setup.inf3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82B
MD50341472cb0d92c106d41143e69bd02b6
SHA16526b95d9fa96b2587bf3f32d2b37e986e2dea30
SHA25658403c6052ffcfade638cf0cd5eec138de2b393058e913011f51a9002f11595b
SHA512c329f8676190e4f1e280c3df5680b29cb6e80cdba6d24fa8fe624991352cd6f9b03fb443e30580a5370977df5cb788ff9733d891afff11f0bfedcbf9e5de9498