Analysis
-
max time kernel
124s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe
-
Size
320KB
-
MD5
eb207cb2b625a41855b4c355a268fcd6
-
SHA1
e48fa8582ec65f9179451120aefd4a8981b192be
-
SHA256
04f112c9ede5e7542c1e236a85df583e92206ba7b1c38078df107603854768b0
-
SHA512
fc008feab204bdfc3c274b05cc6b7c14d01d241d3575d3da0e2824e31c192bc876bfb3713513d106ba2c860255665860868dc4ae4a8bc70e77593677faa21fc8
-
SSDEEP
6144:8i5CBU/2fXbv9MDsJ18/b5S+3BGy6ktLhUqW0n6HmGL:8yCUKLv9FJ18/8BQ+qW261
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2228 WINNET -
Loads dropped DLL 2 IoCs
pid Process 2528 eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe 2528 eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\inf\WINNET eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe File opened for modification C:\Windows\inf\WINNET eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINNET -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2528 eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe Token: SeDebugPrivilege 2228 WINNET -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 WINNET -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2228 WINNET -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2228 2528 eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2228 2528 eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2228 2528 eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2228 2528 eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe 30 PID 2228 wrote to memory of 1840 2228 WINNET 31 PID 2228 wrote to memory of 1840 2228 WINNET 31 PID 2228 wrote to memory of 1840 2228 WINNET 31 PID 2228 wrote to memory of 1840 2228 WINNET 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb207cb2b625a41855b4c355a268fcd6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\inf\WINNETC:\Windows\inf\WINNET2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\program files\internet explorer\iexplore.eXe"C:\program files\internet explorer\iexplore.eXe"3⤵PID:1840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5eb207cb2b625a41855b4c355a268fcd6
SHA1e48fa8582ec65f9179451120aefd4a8981b192be
SHA25604f112c9ede5e7542c1e236a85df583e92206ba7b1c38078df107603854768b0
SHA512fc008feab204bdfc3c274b05cc6b7c14d01d241d3575d3da0e2824e31c192bc876bfb3713513d106ba2c860255665860868dc4ae4a8bc70e77593677faa21fc8