Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
d991a29f3e3af8b477f6110864bcd4a3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d991a29f3e3af8b477f6110864bcd4a3_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
d991a29f3e3af8b477f6110864bcd4a3_JaffaCakes118.exe
-
Size
462KB
-
MD5
d991a29f3e3af8b477f6110864bcd4a3
-
SHA1
b354c95e4eb9c86d3137bd72173342845e39b122
-
SHA256
7bd4ca0e205fb740c37defccff5022fb654cf3a971d70bc0d630a612c0a91b8e
-
SHA512
a62c96d3d5599ce6d07472be1400aafd2cfd6830e09d3fbc1c281d98de8db9618b2cfe661bc7e550185ebc78c09d9e0733d2fa16f5211be60fdc0b2b6e4b28cc
-
SSDEEP
12288:iFZ3pViEqmdpH1GsMUTREk+FFlrG0nmViZMrJFBpMug:u/iwdPjfREfFFdGPtJTpng
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2252 534E.tmp -
Loads dropped DLL 2 IoCs
pid Process 2180 d991a29f3e3af8b477f6110864bcd4a3_JaffaCakes118.exe 2180 d991a29f3e3af8b477f6110864bcd4a3_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d991a29f3e3af8b477f6110864bcd4a3_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2252 534E.tmp 2252 534E.tmp -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2180 d991a29f3e3af8b477f6110864bcd4a3_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2180 d991a29f3e3af8b477f6110864bcd4a3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2252 2180 d991a29f3e3af8b477f6110864bcd4a3_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2252 2180 d991a29f3e3af8b477f6110864bcd4a3_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2252 2180 d991a29f3e3af8b477f6110864bcd4a3_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2252 2180 d991a29f3e3af8b477f6110864bcd4a3_JaffaCakes118.exe 30 PID 2252 wrote to memory of 1208 2252 534E.tmp 21 PID 2252 wrote to memory of 1208 2252 534E.tmp 21 PID 2252 wrote to memory of 1208 2252 534E.tmp 21 PID 2252 wrote to memory of 1208 2252 534E.tmp 21 PID 2252 wrote to memory of 1208 2252 534E.tmp 21 PID 2252 wrote to memory of 1208 2252 534E.tmp 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\d991a29f3e3af8b477f6110864bcd4a3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d991a29f3e3af8b477f6110864bcd4a3_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Xenocode\ApplianceCaches\infected.exe_v2866CD5D\Native\STUBEXE\@APPDATALOCAL@\Temp\534E.tmpC:\Users\Admin\AppData\Local\Temp\534E.tmp3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2252
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5c96b509d15518c12b182902d8f148703
SHA1b0c74ce67c13386d5e38319ee4d2d2656a044039
SHA25682fab0020dd13e62165d5a6cd6fa92a038f03ac77f777df7fe09397ea1fe251a
SHA512e092f93207fa46979c2888f669c08aabc2c36bc3219c64af01add1083ed6480e093734bddf1a61172037bbf6c560e1a6735396e6278328cabf6838a8e05c5381
-
C:\Users\Admin\AppData\Local\Xenocode\ApplianceCaches\infected.exe_v2866CD5D\Native\STUBEXE\@APPDATALOCAL@\Temp\534E.tmp
Filesize16KB
MD59adee9271fb92be9b08ef3f0e6a148ee
SHA19c53132cff4101e36132267eb4a50cb98f74047a
SHA256500c95ec5d39bfae5dc354a5806e7b14755f6b62748cac8ac9ae05dc217f286a
SHA5128c484d7d6dc354fc3b470c6f05345e08e5704b55255fa871aa2af1e6a4476fb11b599abf4f50bdb94af06f379d844b7d5ee6c9e96591f0ee4f93567e3d777bd3