Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe
-
Size
320KB
-
MD5
eacd4a942ea919150ae8abc8b227037a
-
SHA1
94e3b3392256b25daa453463c0ad719b001a2172
-
SHA256
f55fbc503f8658859cd771fcce061b087ba03a76339ac7c14961995785ea2cf7
-
SHA512
0f3e276a4d713296a30fde1b0e20c0381124bba723462afc3cecc84b71c6d5fc625c11744df39f9d8a48ed71c8e6ba5bb9106b1b3569e2fdb9a4b464fd702694
-
SSDEEP
6144:7jffvbjwxC9q3b3Wd7Gh0Iz4lXNN/+fCanAYczOgZPrE05:7jbjwx/M20I0FX+qBdH
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/276-2-0x0000000000400000-0x0000000000484000-memory.dmp upx behavioral1/memory/276-9-0x0000000000400000-0x0000000000484000-memory.dmp upx behavioral1/memory/276-4-0x0000000000400000-0x0000000000484000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe Token: SeDebugPrivilege 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 276 wrote to memory of 1208 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 21 PID 276 wrote to memory of 384 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 3 PID 276 wrote to memory of 432 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 5 PID 276 wrote to memory of 492 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 7 PID 276 wrote to memory of 500 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 8 PID 276 wrote to memory of 608 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 9 PID 276 wrote to memory of 692 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 10 PID 276 wrote to memory of 772 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 11 PID 276 wrote to memory of 828 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 12 PID 276 wrote to memory of 872 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 13 PID 276 wrote to memory of 980 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 15 PID 276 wrote to memory of 296 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 16 PID 276 wrote to memory of 308 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 17 PID 276 wrote to memory of 1072 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 18 PID 276 wrote to memory of 1096 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 19 PID 276 wrote to memory of 1172 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 20 PID 276 wrote to memory of 1208 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 21 PID 276 wrote to memory of 1424 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 23 PID 276 wrote to memory of 880 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 24 PID 276 wrote to memory of 1296 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 25 PID 276 wrote to memory of 2284 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 26 PID 276 wrote to memory of 1796 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 27 PID 276 wrote to memory of 2068 276 eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe 28
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:608
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:1424
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:1296
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS1⤵PID:692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted1⤵PID:828
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"2⤵PID:1172
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:872
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵PID:2068
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService1⤵PID:980
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService1⤵PID:296
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork1⤵PID:1072
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1096
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eacd4a942ea919150ae8abc8b227037a_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:276
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵PID:880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation1⤵PID:2284
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe1⤵PID:1796