Analysis
-
max time kernel
140s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
eab9418c584b46a3ee29bccec62a7a71_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab9418c584b46a3ee29bccec62a7a71_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eab9418c584b46a3ee29bccec62a7a71_JaffaCakes118.exe
-
Size
25KB
-
MD5
eab9418c584b46a3ee29bccec62a7a71
-
SHA1
c311739703175c2e9adeb208e8c38f8f9008f660
-
SHA256
2544d441f11aedfa7cc0e9b1ac783005086d7e5e25333e38ae2bfc149bdd1fe1
-
SHA512
05f26a2692eefec6ab7a5140f3bf9b041e0ba18eedeb7aa8ab03d4be0c20abd5cfeb129493def8fb45a52d20afaff5da0160ed33a4c50e856f41710d4be74015
-
SSDEEP
384:LTu8soPGPqTLSX0SyJzsFrRveJ2UocUB/PBhBRhOF8I40zm:L5PTTQ0A5R2ZocUJZhcF8I406
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab9418c584b46a3ee29bccec62a7a71_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3796 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3796 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4808 eab9418c584b46a3ee29bccec62a7a71_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eab9418c584b46a3ee29bccec62a7a71_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eab9418c584b46a3ee29bccec62a7a71_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4808
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x470 0x3c81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3796