Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
da8906837d174cdcd136855e4281128f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da8906837d174cdcd136855e4281128f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da8906837d174cdcd136855e4281128f_JaffaCakes118.exe
-
Size
352KB
-
MD5
da8906837d174cdcd136855e4281128f
-
SHA1
bd9d86bdd260fedd2c558a400d1736cd96cbfa22
-
SHA256
1c232e4898b7ca75c7c3be0531d063023ebe3795b2b0f18adafb7e8098cb708c
-
SHA512
453fefde3d3cd1e5daf82f01e9fbd6773f045ed0f681df14ed503b0dc2ab7073959607ebb903d0586c9ffb77c7bf55ab4abae516a9b7da23dacfcca2890c17ec
-
SSDEEP
6144:ZBZ5OpF9kfSOBlWWRmGwL4QQgKKX8x7/2xWqWma2XDzHPt281:ZBZ5Ob9pOjWtGNgDUiWqWNKDrt2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1608 jigurf.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\jigurf.exe da8906837d174cdcd136855e4281128f_JaffaCakes118.exe File created C:\Windows\SysWOW64\jigurf.exe da8906837d174cdcd136855e4281128f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da8906837d174cdcd136855e4281128f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jigurf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Enigma Protector\29AEB4A0365755F6-B862CAE984EA4D0E jigurf.exe Key created \REGISTRY\USER\.DEFAULT\Software jigurf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Enigma Protector jigurf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Enigma Protector\29AEB4A0365755F6-B862CAE984EA4D0E jigurf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\EnigmaDevelopers\ jigurf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Enigma Protector\29AEB4A0365755F6-B862CAE984EA4D0E\02F01F553A112DCE-00C9DB38C18D5FD1 jigurf.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Enigma Protector\29AEB4A0365755F6-B862CAE984EA4D0E\02F01F553A112DCE-00C9DB38C18D5FD1\8BD0F9B1 = fad1147286eeb500d5e63ad611af jigurf.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Enigma Protector\29AEB4A0365755F6-B862CAE984EA4D0E\Options = 1c65ca371922cc3099fda0578d159434dc5b5ce16a2391c9161339c29d6d5e75fe5cfff47fdc20c67b812289ef614e13b6b4cbfb7c155cd580bfc660cee01cdf4f7d2419c8f04c372efb4ed5c258b2b567383babfb4d10e7a910006bd3db5fbd8df3e5f310b60e44 jigurf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2308 da8906837d174cdcd136855e4281128f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2984 2308 da8906837d174cdcd136855e4281128f_JaffaCakes118.exe 32 PID 2308 wrote to memory of 2984 2308 da8906837d174cdcd136855e4281128f_JaffaCakes118.exe 32 PID 2308 wrote to memory of 2984 2308 da8906837d174cdcd136855e4281128f_JaffaCakes118.exe 32 PID 2308 wrote to memory of 2984 2308 da8906837d174cdcd136855e4281128f_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\da8906837d174cdcd136855e4281128f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da8906837d174cdcd136855e4281128f_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\DA8906~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Windows\SysWOW64\jigurf.exeC:\Windows\SysWOW64\jigurf.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD5da8906837d174cdcd136855e4281128f
SHA1bd9d86bdd260fedd2c558a400d1736cd96cbfa22
SHA2561c232e4898b7ca75c7c3be0531d063023ebe3795b2b0f18adafb7e8098cb708c
SHA512453fefde3d3cd1e5daf82f01e9fbd6773f045ed0f681df14ed503b0dc2ab7073959607ebb903d0586c9ffb77c7bf55ab4abae516a9b7da23dacfcca2890c17ec