Analysis
-
max time kernel
51s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 20:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe
Resource
win7-20240903-en
8 signatures
150 seconds
General
-
Target
fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe
-
Size
148KB
-
MD5
fd19d54287d984c899908a7c341dbc06
-
SHA1
a66e77d6f13d3af4ad1476246c637d4c04d65633
-
SHA256
da135b38df8b6d87ecd98079b56eae725ae22e1846c14f4e0ed7a75a2290cdc8
-
SHA512
196ec8bfb24f24c85d5e05b60c9aed7e39b5e2480d3d8dddc5fec9f6f27cab85682ee5d86a5e5a0ffe9f0b9c61ea49737fa55d668221c427e44fefbe87ecde41
-
SSDEEP
3072:uiIroK9w8wZD9JS8ougbDz/KCwvlcH2GK39jqj0lRtDIv:uixxD8bDzSvlOXm9jTlRt8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2332 svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whoami.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 2928 net.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1972 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 1972 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 2332 svchost.exe 2332 svchost.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeShutdownPrivilege 1972 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe Token: SeShutdownPrivilege 2332 svchost.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe Token: SeDebugPrivilege 2764 whoami.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2332 1972 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2332 1972 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2332 1972 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2332 1972 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2332 1972 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 30 PID 2332 wrote to memory of 2764 2332 svchost.exe 31 PID 2332 wrote to memory of 2764 2332 svchost.exe 31 PID 2332 wrote to memory of 2764 2332 svchost.exe 31 PID 2332 wrote to memory of 2764 2332 svchost.exe 31 PID 2332 wrote to memory of 2928 2332 svchost.exe 33 PID 2332 wrote to memory of 2928 2332 svchost.exe 33 PID 2332 wrote to memory of 2928 2332 svchost.exe 33 PID 2332 wrote to memory of 2928 2332 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe "C:\Users\Admin\AppData\Local\Temp\fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\whoami.exeC:\Windows\system32\whoami.exe /all3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\SysWOW64\net.exeC:\Windows\system32\net.exe view3⤵
- System Location Discovery: System Language Discovery
- Discovers systems in the same network
PID:2928
-
-