Analysis
-
max time kernel
134s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 05:51
Behavioral task
behavioral1
Sample
e62c5f451ecf2ea4c37d7abab221f92b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e62c5f451ecf2ea4c37d7abab221f92b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e62c5f451ecf2ea4c37d7abab221f92b_JaffaCakes118.exe
-
Size
119KB
-
MD5
e62c5f451ecf2ea4c37d7abab221f92b
-
SHA1
a6877acb6cb9bc98aa6ca3f4ed7098b0d5fd28cc
-
SHA256
92c99bcb27c5a04c6863ca113f61c9fb5637acc4bd5c6bf5278df7f60b92adfa
-
SHA512
360d6ff6e9660701e61e0c3bddbb0dbc1f7c7fe5f418d7b44a4838e22d4fa5e7a5a9bf00777132384a5c2666fcf41bfc3fa3f699405a70627ea0581a61ded890
-
SSDEEP
3072:7yiwOoyzP+m+Gvp3x1KlIajqpgRNikiNAiIF:1wmPzx1Kl5MgRclC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e62c5f451ecf2ea4c37d7abab221f92b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1680 e62c5f451ecf2ea4c37d7abab221f92b_JaffaCakes118.exe Token: SeDebugPrivilege 1680 e62c5f451ecf2ea4c37d7abab221f92b_JaffaCakes118.exe Token: SeDebugPrivilege 1708 e62c5f451ecf2ea4c37d7abab221f92b_JaffaCakes118.exe Token: SeDebugPrivilege 1708 e62c5f451ecf2ea4c37d7abab221f92b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1708 1600 taskeng.exe 33 PID 1600 wrote to memory of 1708 1600 taskeng.exe 33 PID 1600 wrote to memory of 1708 1600 taskeng.exe 33 PID 1600 wrote to memory of 1708 1600 taskeng.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e62c5f451ecf2ea4c37d7abab221f92b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e62c5f451ecf2ea4c37d7abab221f92b_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
C:\Windows\system32\taskeng.exetaskeng.exe {B293BE72-21D3-487D-80C0-EAD794CA8BDE} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\e62c5f451ecf2ea4c37d7abab221f92b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e62c5f451ecf2ea4c37d7abab221f92b_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1708
-