Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
ef3246f2037fe7dae314bbfc2b8ee882_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef3246f2037fe7dae314bbfc2b8ee882_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef3246f2037fe7dae314bbfc2b8ee882_JaffaCakes118.exe
-
Size
310KB
-
MD5
ef3246f2037fe7dae314bbfc2b8ee882
-
SHA1
68b878ba4dddf51c430f3f09193132f9e8077ccd
-
SHA256
7b8be4068e38665975aa6db55615ae9a13467a1819c2fbd68e6ae9a17982daf5
-
SHA512
92f23905100d92536b4120a33092247fca2daf930f8c5153b0426ca1d86adf54ba7bc62e5ce065d5f76b9b50ce19851156ea919a0981dbd16719e60b469e3dbb
-
SSDEEP
6144:pSHHPAWjbyoGTXzSbvUcjEXyaHEWNpesMvT+0GvefwHUfy59+oyYyMCr:wHxbyomz6VjErkWLbksUfy59+dYyM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3052 Hacker.com.cn.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3052 set thread context of 2300 3052 Hacker.com.cn.exe 31 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\SDSIAU.DAT ef3246f2037fe7dae314bbfc2b8ee882_JaffaCakes118.exe File created C:\Windows\FBOSVI.DAT ef3246f2037fe7dae314bbfc2b8ee882_JaffaCakes118.exe File created C:\Windows\Hacker.com.cn.exe ef3246f2037fe7dae314bbfc2b8ee882_JaffaCakes118.exe File opened for modification C:\Windows\Hacker.com.cn.exe ef3246f2037fe7dae314bbfc2b8ee882_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef3246f2037fe7dae314bbfc2b8ee882_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hacker.com.cn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2068 ef3246f2037fe7dae314bbfc2b8ee882_JaffaCakes118.exe Token: SeDebugPrivilege 3052 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2300 3052 Hacker.com.cn.exe 31 PID 3052 wrote to memory of 2300 3052 Hacker.com.cn.exe 31 PID 3052 wrote to memory of 2300 3052 Hacker.com.cn.exe 31 PID 3052 wrote to memory of 2300 3052 Hacker.com.cn.exe 31 PID 3052 wrote to memory of 2300 3052 Hacker.com.cn.exe 31 PID 3052 wrote to memory of 2300 3052 Hacker.com.cn.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef3246f2037fe7dae314bbfc2b8ee882_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef3246f2037fe7dae314bbfc2b8ee882_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\WINDOWS\SysWOW64\svchost.exeC:\WINDOWS\system32\svchost.exe2⤵PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
310KB
MD5ef3246f2037fe7dae314bbfc2b8ee882
SHA168b878ba4dddf51c430f3f09193132f9e8077ccd
SHA2567b8be4068e38665975aa6db55615ae9a13467a1819c2fbd68e6ae9a17982daf5
SHA51292f23905100d92536b4120a33092247fca2daf930f8c5153b0426ca1d86adf54ba7bc62e5ce065d5f76b9b50ce19851156ea919a0981dbd16719e60b469e3dbb