Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
da332138b10a0c1a0e8acd6d54ff6c79_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da332138b10a0c1a0e8acd6d54ff6c79_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da332138b10a0c1a0e8acd6d54ff6c79_JaffaCakes118.exe
-
Size
195KB
-
MD5
da332138b10a0c1a0e8acd6d54ff6c79
-
SHA1
c7ab1d12eb3daaf4e4f15d0f1a5e6e04f0bbc1c0
-
SHA256
6f85df119da9300e946260a2c58d2ba00a251cb7efc285a21488735fc474ce6d
-
SHA512
70988be86b0312e5d475bee41f3d61062c29f98cd248ac614563e123251b200ea689d024cf126554d56b504caac17aa98b67e3f777130d52f62ee6bfa6c1409f
-
SSDEEP
6144:r1bGKD5GJ5mtg/rr4Wep4A0aF++ejlwbz+oUu2sF:jGNzNaF+5qr3J
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2052 iexplore.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\winf = "\"C:\\Users\\Admin\\AppData\\Roaming\\winf.exe\" -autorun" iexplore.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA da332138b10a0c1a0e8acd6d54ff6c79_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da332138b10a0c1a0e8acd6d54ff6c79_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe 2052 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2364 da332138b10a0c1a0e8acd6d54ff6c79_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2052 2364 da332138b10a0c1a0e8acd6d54ff6c79_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2052 2364 da332138b10a0c1a0e8acd6d54ff6c79_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2052 2364 da332138b10a0c1a0e8acd6d54ff6c79_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2052 2364 da332138b10a0c1a0e8acd6d54ff6c79_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2052 2364 da332138b10a0c1a0e8acd6d54ff6c79_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2052 2364 da332138b10a0c1a0e8acd6d54ff6c79_JaffaCakes118.exe 30 PID 2052 wrote to memory of 1204 2052 iexplore.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\da332138b10a0c1a0e8acd6d54ff6c79_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da332138b10a0c1a0e8acd6d54ff6c79_JaffaCakes118.exe"2⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Deletes itself
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052
-
-