Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 15:46
Static task
static1
Behavioral task
behavioral1
Sample
f6569822715861316bab53371000610e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6569822715861316bab53371000610e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6569822715861316bab53371000610e_JaffaCakes118.exe
-
Size
277KB
-
MD5
f6569822715861316bab53371000610e
-
SHA1
2d40ae1e3616ee17db5026f8ac11cad8d362878a
-
SHA256
9c2c0b820c239cdecdbe3d82236fa2eba5cc331a1700d3d78ac1ff41bb9ffb87
-
SHA512
f722c6132413c96d60363c9246acebf6c234afdab000af5465d092c5ac479e884abdbd2352c51104a61a7726d6fccba19614a8e20ea182e9804af50457e4ab9a
-
SSDEEP
6144:jz0rRjWJ3ZVWWg3Ic/ddJPcHmnVXxGSQ8I26v382BbsK:jziSZS17HvGShCv382GK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2816 smlogsvc.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ieapfltr.dat f6569822715861316bab53371000610e_JaffaCakes118.exe File created C:\Windows\SysWOW64\smlogsvc.exe f6569822715861316bab53371000610e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\smlogsvc.exe f6569822715861316bab53371000610e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ieapfltr.dat smlogsvc.exe File opened for modification C:\Windows\SysWOW64\smlogsvc.exe smlogsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6569822715861316bab53371000610e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smlogsvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2688 f6569822715861316bab53371000610e_JaffaCakes118.exe Token: SeDebugPrivilege 2816 smlogsvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6569822715861316bab53371000610e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6569822715861316bab53371000610e_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
C:\Windows\SysWOW64\smlogsvc.exeC:\Windows\SysWOW64\smlogsvc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD5f6569822715861316bab53371000610e
SHA12d40ae1e3616ee17db5026f8ac11cad8d362878a
SHA2569c2c0b820c239cdecdbe3d82236fa2eba5cc331a1700d3d78ac1ff41bb9ffb87
SHA512f722c6132413c96d60363c9246acebf6c234afdab000af5465d092c5ac479e884abdbd2352c51104a61a7726d6fccba19614a8e20ea182e9804af50457e4ab9a