Analysis
-
max time kernel
140s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 03:14
Behavioral task
behavioral1
Sample
f99b08f76ce194da2c301ca5665e5b3f_JaffaCakes118.exe
Resource
win7-20240903-en
2 signatures
150 seconds
General
-
Target
f99b08f76ce194da2c301ca5665e5b3f_JaffaCakes118.exe
-
Size
101KB
-
MD5
f99b08f76ce194da2c301ca5665e5b3f
-
SHA1
1d3b959e6b2196cb24351a303de687a2ae0c568a
-
SHA256
1a77f64256c62d89bb261c8c29f3ff4bc15ba31aecebdbf0769917643e8c9442
-
SHA512
3db794b9ae64fdd4e02ca89f42f51f54b63c94bc3f97b288f483f27cffb6208b79da503e41f299d77ca83ef9a26a819a4f4b7f74111ea75ae5c84b67b7eb3ae6
-
SSDEEP
1536:/MynefdTUutLyFDP4zgTEmPIIfngftTmd0dodVasUkN6xVUgxM2oEfo:UXfdTRtWN4zgEAetTmdAodh2VNRJ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4252-0-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-1-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-2-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-3-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-4-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-5-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-6-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-7-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-8-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-9-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-10-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-11-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-12-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-13-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-14-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4252-15-0x0000000000400000-0x0000000000458000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f99b08f76ce194da2c301ca5665e5b3f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4940 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4940 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\f99b08f76ce194da2c301ca5665e5b3f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f99b08f76ce194da2c301ca5665e5b3f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4252
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x498 0x2f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4940