Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 08:54
Behavioral task
behavioral1
Sample
dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe
-
Size
29KB
-
MD5
dfdb8c491f30f7909d48ece8de241042
-
SHA1
cacf3c7c976b0655e8f5ef0306d795e329880624
-
SHA256
39d1fcf8d337cd424e5d7a0628815185f72eb220f4635b14dea08e16bf5c8223
-
SHA512
f9a1a56f2296a53d43c2bd14d3d21bb07ba31355f1ae01429c258d1ffb364f5f32c39f6769a6025b178cc07736dac3668ec0d4d7a5562fe6a98a9b99a8586e04
-
SSDEEP
768:EGp79Wxu0myvTPK6qrsejBKh0p29SgR6d:R79UrODKhG29j6d
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2656 netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2656 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 85 PID 2644 wrote to memory of 2656 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 85 PID 2644 wrote to memory of 2656 2644 dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe" "dfdb8c491f30f7909d48ece8de241042_JaffaCakes118.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2656
-