Analysis
-
max time kernel
140s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe
-
Size
3.2MB
-
MD5
ea7e6c59e3462d71529e9419819d2303
-
SHA1
64e3a058b3ed80f4eed58d48946a985665f4f2fa
-
SHA256
75782095df088521c63ab0a0530cd2bdbc31e14948f11daaab093b7599dfef67
-
SHA512
30c8fc486ea30d180e5c9b677a34922f7d48292bccc004a7f10e2bc0d4cf6136e9dc61770f777ac07f847e4c739e5c3651a00b684daeba683367a26c8431a448
-
SSDEEP
49152:Vf6QfhxQzZYwbLZ0CQT27kP/eF3TRTMyDJOGJqT5+GP:VLAzZYwbGCQT24P/ARDt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mprf\shell\open ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3F2BBC05-40DF-11D2-9455-00104BC936FF}\LocalServer32 ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.DocHostUIHandler\ = "Implements DocHostUIHandler" ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.DocHostUIHandler\Clsid ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3F2BBC05-40DF-11D2-9455-00104BC936FF}\ProgID\ = "ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.DocHostUIHandler" ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mpf\ = "mprf" ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mprf\DefaultIcon ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mprf\shell\open\command ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mprf\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe \"%1\"" ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mprf ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\mprf\EditFlags = "0" ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mprf\shell ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3F2BBC05-40DF-11D2-9455-00104BC936FF} ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3F2BBC05-40DF-11D2-9455-00104BC936FF}\ = "Implements DocHostUIHandler" ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3F2BBC05-40DF-11D2-9455-00104BC936FF}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe" ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3F2BBC05-40DF-11D2-9455-00104BC936FF}\ProgID ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\mprf\BrowserFlags = "8" ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mprf\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe,0" ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.DocHostUIHandler ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.DocHostUIHandler\Clsid\ = "{3F2BBC05-40DF-11D2-9455-00104BC936FF}" ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mpf ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4112 ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4112 ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe 4112 ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea7e6c59e3462d71529e9419819d2303_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4112