Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 16:09
Static task
static1
Behavioral task
behavioral1
Sample
e520d01e184e7af449548149e8f41548_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e520d01e184e7af449548149e8f41548_JaffaCakes118.exe
-
Size
358KB
-
MD5
e520d01e184e7af449548149e8f41548
-
SHA1
1450af3099391ae76e78e2546b1a5e01058c28bd
-
SHA256
a5d14ef9c1b689c9b7a9c5130eb7c148be1266411c2d0fa837073b445ff30737
-
SHA512
1c1b241ec93f1f923e92b7747cf518b66c81bc7473acb9d46dcbe08a952d9374485a1aa38df0a303be7540ba88f13202954f805b490b88b074f4089f0894f0cc
-
SSDEEP
6144:SR+KxfBgGjFJ5t/qxVSmWKr8H/qZ7GG0hNT1U/cl98wugh:SRLJJpJK9Ai8GITTfzh
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 iplogger.org 7 iplogger.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e520d01e184e7af449548149e8f41548_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 2192 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2192 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2332 1744 e520d01e184e7af449548149e8f41548_JaffaCakes118.exe 31 PID 1744 wrote to memory of 2332 1744 e520d01e184e7af449548149e8f41548_JaffaCakes118.exe 31 PID 1744 wrote to memory of 2332 1744 e520d01e184e7af449548149e8f41548_JaffaCakes118.exe 31 PID 1744 wrote to memory of 2332 1744 e520d01e184e7af449548149e8f41548_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2192 2332 cmd.exe 33 PID 2332 wrote to memory of 2192 2332 cmd.exe 33 PID 2332 wrote to memory of 2192 2332 cmd.exe 33 PID 2332 wrote to memory of 2192 2332 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e520d01e184e7af449548149e8f41548_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e520d01e184e7af449548149e8f41548_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "e520d01e184e7af449548149e8f41548_JaffaCakes118.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\e520d01e184e7af449548149e8f41548_JaffaCakes118.exe" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "e520d01e184e7af449548149e8f41548_JaffaCakes118.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-