Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 08:12
Static task
static1
Behavioral task
behavioral1
Sample
f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe
-
Size
242KB
-
MD5
f592580e23f6acff36f9788e9c0950f4
-
SHA1
469b65378a0ca8b73bfa2a930392b9dd3bb9a4b7
-
SHA256
9f943027ece3ae91b1a0b357f98e5062587afef739f968861b321f52da90f783
-
SHA512
f3c2e1f631e8ed2124fd3c0dcfe4deb90076edbb404ea25edda4ffe1305ecb643bed002f0f77f875858c93f3af241937b5b65294a4baefc4218f8c3f0c55184e
-
SSDEEP
6144:tI7AtGOOw87glyacITVEUvNG1t7S9uiq2k5iq2kCm:ATOr8bTITVEUFG1NS9uiq2k5iq2kCm
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sJDguxKm5sc.exe f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sJDguxKm5sc.exe f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2284 f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe 2284 f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2284 f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2284 f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2364 2284 f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe 30 PID 2284 wrote to memory of 2364 2284 f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe 30 PID 2284 wrote to memory of 2364 2284 f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe 30 PID 2284 wrote to memory of 2364 2284 f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f592580e23f6acff36f9788e9c0950f4_JaffaCakes118.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:2364
-