Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 13:24
Static task
static1
Behavioral task
behavioral1
Sample
f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe
-
Size
19KB
-
MD5
f61b6e7cb6aaa154b7089854f4b7710e
-
SHA1
0ce8b1e0f9f220c71da791b0be2d4b4af3b6a60c
-
SHA256
de9a9d2be6b34d446e82e3461c93fff48a98b0bd97e653e9e28b344208405014
-
SHA512
09aa8d5917539f0c35c7b63a8e659fc0a63f6b1cf7c026724683e6deca7f272ab9c6a50866d70ff0e9ca5547452d5a75f541f0fbb51da839e7e3a7b29449066c
-
SSDEEP
384:d88hYKQhipr8bfp717XWJAiQ/O0pJX/OwSulCkBQwNwW+TiKJ49oo5aH:/hkhmUfHWJ5QpJ21ulLBujc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1076 f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1684 f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1684 wrote to memory of 468 1684 f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe 83 PID 1684 wrote to memory of 468 1684 f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe 83 PID 1684 wrote to memory of 468 1684 f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\F61B6E~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:468
-
-
C:\Windows\SysWOW64\f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exeC:\Windows\SysWOW64\f61b6e7cb6aaa154b7089854f4b7710e_JaffaCakes118.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5f61b6e7cb6aaa154b7089854f4b7710e
SHA10ce8b1e0f9f220c71da791b0be2d4b4af3b6a60c
SHA256de9a9d2be6b34d446e82e3461c93fff48a98b0bd97e653e9e28b344208405014
SHA51209aa8d5917539f0c35c7b63a8e659fc0a63f6b1cf7c026724683e6deca7f272ab9c6a50866d70ff0e9ca5547452d5a75f541f0fbb51da839e7e3a7b29449066c