Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe
-
Size
356KB
-
MD5
d5e517150fb500cf0ab871c9a87b0289
-
SHA1
beac16c5d6c33a04209683b123efbfa7fa23f0c2
-
SHA256
eb37576f424a7cc3806bc43d92072aa8089f5754d2a477430f8e65ce1cdabad2
-
SHA512
7f98a9da1379a5188bdcc3cc27a76a78de52210812f97850cab214608f0f8167985b6c683288bf0ad4b15676252f2e4b565efeb6bcc9f2ad2e2185887ca0c903
-
SSDEEP
6144:uXYGc9a6BMhhAxfekFECZxVpRgGvbqURPLjJoxGq6IEo:uXYdQU8Ape8gGvbqURzFYGq66
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1488 server.exe -
Loads dropped DLL 1 IoCs
pid Process 2708 d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1488 server.exe 1488 server.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: 33 2708 d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2708 d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe Token: 33 2708 d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2708 d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe Token: 33 2708 d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2708 d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe Token: 33 2708 d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2708 d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe Token: 33 1488 server.exe Token: SeIncBasePriorityPrivilege 1488 server.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2708 wrote to memory of 1488 2708 d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe 30 PID 2708 wrote to memory of 1488 2708 d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe 30 PID 2708 wrote to memory of 1488 2708 d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe 30 PID 2708 wrote to memory of 1488 2708 d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe 30 PID 1488 wrote to memory of 1208 1488 server.exe 21 PID 1488 wrote to memory of 1208 1488 server.exe 21 PID 1488 wrote to memory of 1208 1488 server.exe 21 PID 1488 wrote to memory of 1208 1488 server.exe 21 PID 1488 wrote to memory of 1208 1488 server.exe 21 PID 1488 wrote to memory of 1208 1488 server.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2010.01.09T16.00\Virtual\STUBEXE\@APPDATALOCAL@\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2010.01.09T16.00\Virtual\STUBEXE\@APPDATALOCAL@\Temp\server.exe
Filesize17KB
MD54927ddbb60db41b4b6fe90540c5ae7bb
SHA13626a815c0c8039361baf12a6d4fc3a1d06676df
SHA256f17dcb91e79f9d879a66ad7ff536da5261f6d57af58fb455e903c2920d6fc018
SHA5125bf3cc72eb8cbe92f90ecc761ac59e14a30baa60f79343d3ce576155d6e490be09c92fe13c3567b813997a2c1e2354f3c0abbc500217590e0a422ca8b4fdb32c