Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe
-
Size
230KB
-
MD5
fbd1fa0928dfd73516d7d08266544a4d
-
SHA1
d076aec33124bf8d71aef1cbd1e6385850ca7650
-
SHA256
dcf1636a6b75f4aa8b8ea2e14e3c2b7c850a99fb9ef9dbe364997a09f542664c
-
SHA512
11cd58cc6ea862ed30ffe6ce3667fa715ec7522c003a54ceb0a0f6d1ece61750d40759f7b2c49be19326ca9c1f7475036bb3959bf1975c44a4742f9dcc6221a2
-
SSDEEP
3072:tzAi0pU4VSVU69KEEmJHkLvF3X48WFLEaXb0zPIBKM7zX/DHvtC++aYhkWU+KYcR:tz7iUcS6yKlkOhkDz7PtBrUkMK
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4588 set thread context of 2800 4588 fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe 82 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe File created C:\Windows\assembly\Desktop.ini fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2288 2800 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4588 fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe Token: 33 4588 fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4588 fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4588 wrote to memory of 2800 4588 fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe 82 PID 4588 wrote to memory of 2800 4588 fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe 82 PID 4588 wrote to memory of 2800 4588 fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe 82 PID 4588 wrote to memory of 2800 4588 fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe 82 PID 4588 wrote to memory of 2800 4588 fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe 82 PID 4588 wrote to memory of 2800 4588 fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe 82 PID 4588 wrote to memory of 2800 4588 fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbd1fa0928dfd73516d7d08266544a4d_JaffaCakes118.exe"2⤵PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 1923⤵
- Program crash
PID:2288
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2800 -ip 28001⤵PID:3260