Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 03:27
Behavioral task
behavioral1
Sample
eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe
-
Size
3KB
-
MD5
eefbc84fa9ab0ef4e06d251b9829ec56
-
SHA1
7e685087aa8b45aebb5ca9a86ba9d4c0bdbbdc92
-
SHA256
1e154faaf2f81734e88baebeb9eae2136853d843f5a91f64504496676d7456d0
-
SHA512
9d1d613d0d6a616036b61a33e999a470106b8f1ad93c374dd417dc9bc22e649ba42db37ba8b1188d9016cc479aec75f0d1bb0de94e70ea16cf30f206db50f6d3
Malware Config
Extracted
metasploit
windows/download_exec
http://958EDC3E1EF17895.dyndns.org:443/INITM
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1648 eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eefbc84fa9ab0ef4e06d251b9829ec56_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648