Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
f16c15ada304dd64e7b3b00dd4417c3e_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
f16c15ada304dd64e7b3b00dd4417c3e_JaffaCakes118.exe
-
Size
97KB
-
MD5
f16c15ada304dd64e7b3b00dd4417c3e
-
SHA1
47f98785fa32a23f813949e830759c81ed94b9af
-
SHA256
50538ff9d7f97c4b8c1e37f74462e199d91319e9df2e9c26d3a07da30ed65dcf
-
SHA512
1823a4b0f055ec3ea3ddf8b91add1d0eaaf506b7e417aa960cffe9798e36c6c57de9621ddf5153dda7182a051129b88f79d97bf3b8911dd5762fcb062878b7a6
-
SSDEEP
1536:opVExNAkP07kGRG5ByufTZUi7FRf6sYchCZNevpo:uaUkP8kGRi5fTj7Hf6sYLZH
Malware Config
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/tB8Ub6Me
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 50 IoCs
flow ioc 20 pastebin.com 41 pastebin.com 5 pastebin.com 17 pastebin.com 28 pastebin.com 36 pastebin.com 48 pastebin.com 10 pastebin.com 11 pastebin.com 42 pastebin.com 43 pastebin.com 25 pastebin.com 29 pastebin.com 50 pastebin.com 18 pastebin.com 38 pastebin.com 45 pastebin.com 9 pastebin.com 22 pastebin.com 27 pastebin.com 7 pastebin.com 33 pastebin.com 53 pastebin.com 30 pastebin.com 46 pastebin.com 49 pastebin.com 51 pastebin.com 4 pastebin.com 19 pastebin.com 35 pastebin.com 52 pastebin.com 8 pastebin.com 12 pastebin.com 34 pastebin.com 44 pastebin.com 14 pastebin.com 32 pastebin.com 24 pastebin.com 39 pastebin.com 23 pastebin.com 37 pastebin.com 40 pastebin.com 47 pastebin.com 6 pastebin.com 21 pastebin.com 15 pastebin.com 16 pastebin.com 26 pastebin.com 13 pastebin.com 31 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f16c15ada304dd64e7b3b00dd4417c3e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1232 f16c15ada304dd64e7b3b00dd4417c3e_JaffaCakes118.exe Token: SeDebugPrivilege 1232 f16c15ada304dd64e7b3b00dd4417c3e_JaffaCakes118.exe