Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
dbdc2b48296867876d05a226d20482d8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dbdc2b48296867876d05a226d20482d8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dbdc2b48296867876d05a226d20482d8_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
dbdc2b48296867876d05a226d20482d8
-
SHA1
2ff372669c73a511287fc4108a858b3e0deee44c
-
SHA256
17fd3a6daf9b552140cbd896879d32c3130c68e6a3d9b51e709d2e6d68591a54
-
SHA512
92d11dca1274debb179f614840cf68c6947f130493fb06a2a0a7622ebde2e5ac8268157f0643f4ab3fa5968ecb8cc8963e19d86b65acae481e5f4da068205b37
-
SSDEEP
24576:Y1bJ8o6fRbiFXXK1aP4lugAvpQFC3Vqn7aD7+jW7h5QnnEh0xp8t6hewDLyEe9Z7:Y1bJjXXhwWpQFC3Vqn7aD7+jW7h5Qnno
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbdc2b48296867876d05a226d20482d8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2220 dbdc2b48296867876d05a226d20482d8_JaffaCakes118.exe 2220 dbdc2b48296867876d05a226d20482d8_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2220 dbdc2b48296867876d05a226d20482d8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2556 2220 dbdc2b48296867876d05a226d20482d8_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2556 2220 dbdc2b48296867876d05a226d20482d8_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2556 2220 dbdc2b48296867876d05a226d20482d8_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2556 2220 dbdc2b48296867876d05a226d20482d8_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbdc2b48296867876d05a226d20482d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbdc2b48296867876d05a226d20482d8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵
- System Location Discovery: System Language Discovery
PID:2556
-