Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
ef914d33e303c511111f07b458d74412_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef914d33e303c511111f07b458d74412_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef914d33e303c511111f07b458d74412_JaffaCakes118.exe
-
Size
56KB
-
MD5
ef914d33e303c511111f07b458d74412
-
SHA1
1732ad0bf303f7f848f5ec8a45547db7584d607f
-
SHA256
c26f9555ad98cb2f8d80362681b2c04735f2b9bb6b58522bfb1d822057036e30
-
SHA512
f4adbd9ca081189c37d6eba747d405a193b1c45481c0aed7f2f138ebdb84dbc6bcd419e84b9c9fdfe40c10be555de16710312cf36b7c09a7ddccc1830683655d
-
SSDEEP
768:yrAYaCQKo+64VQ4VRfSO/dcgFtJDhuAhiDWxhVu3i/3K9LDnLg0P:ysYzyH4VtOG3CWLSi/cLb
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 2696 rundll32.exe 7 2696 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2696 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef914d33e303c511111f07b458d74412_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2696 2096 ef914d33e303c511111f07b458d74412_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2696 2096 ef914d33e303c511111f07b458d74412_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2696 2096 ef914d33e303c511111f07b458d74412_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2696 2096 ef914d33e303c511111f07b458d74412_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2696 2096 ef914d33e303c511111f07b458d74412_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2696 2096 ef914d33e303c511111f07b458d74412_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2696 2096 ef914d33e303c511111f07b458d74412_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef914d33e303c511111f07b458d74412_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef914d33e303c511111f07b458d74412_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\ins9FB9.tmp", start first worker2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD57496706fff0e8ad402dc05cc6ad81f60
SHA1b3781694149d88afc734b14f9310189dcc967b5c
SHA256807af45d97bbd09ddd4e546cd21ce8a28f93060788f5ce4626f1a8abc333c51a
SHA512817641ec6da6d707306ffa6e713b7ad3b7293bb2c038f0fc75b9bf18ced403786c2686a70e101eeac81926b584f8a361e8e00a3b7be3c252a81d71a9f421fd36