Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe
-
Size
15KB
-
MD5
ff3a76a12e9b994de89081909a22da10
-
SHA1
7de4c6117f90ec7c4359cbd54cd631f9182405d1
-
SHA256
a69294a60dfd2cf4617f08ab77f55800f412629b87a9678263019f671c31f05f
-
SHA512
910cf6a0e8585e14e409eddcae7b7afeac969ad9d4cebd65e2691230116b0579d014d0a1f51636c4bb4afa16c1443cf05f4a1aada542a4f65272ec5f45024716
-
SSDEEP
384:iFIoHZIGUbjp8d3NfzhzkHVXVbZb7OEzWIpWIX6lm:V4ZIRfp8d3NfzhzkdFI0pXIm
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1364 wrote to memory of 1664 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 28 PID 1364 wrote to memory of 1664 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 28 PID 1364 wrote to memory of 1664 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 28 PID 1364 wrote to memory of 1664 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 28 PID 1364 wrote to memory of 1664 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 28 PID 1364 wrote to memory of 1664 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 28 PID 1364 wrote to memory of 1664 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 28 PID 1364 wrote to memory of 2256 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2256 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2256 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2256 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2256 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2256 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2256 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2180 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 32 PID 1364 wrote to memory of 2180 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 32 PID 1364 wrote to memory of 2180 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 32 PID 1364 wrote to memory of 2180 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 32 PID 1364 wrote to memory of 2180 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 32 PID 1364 wrote to memory of 2180 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 32 PID 1364 wrote to memory of 2180 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 32 PID 1364 wrote to memory of 2536 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 34 PID 1364 wrote to memory of 2536 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 34 PID 1364 wrote to memory of 2536 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 34 PID 1364 wrote to memory of 2536 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 34 PID 1364 wrote to memory of 2536 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 34 PID 1364 wrote to memory of 2536 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 34 PID 1364 wrote to memory of 2536 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 34 PID 1364 wrote to memory of 2972 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 36 PID 1364 wrote to memory of 2972 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 36 PID 1364 wrote to memory of 2972 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 36 PID 1364 wrote to memory of 2972 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 36 PID 1364 wrote to memory of 2972 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 36 PID 1364 wrote to memory of 2972 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 36 PID 1364 wrote to memory of 2972 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 36 PID 1364 wrote to memory of 2072 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 38 PID 1364 wrote to memory of 2072 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 38 PID 1364 wrote to memory of 2072 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 38 PID 1364 wrote to memory of 2072 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 38 PID 1364 wrote to memory of 2072 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 38 PID 1364 wrote to memory of 2072 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 38 PID 1364 wrote to memory of 2072 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 38 PID 1364 wrote to memory of 2040 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 40 PID 1364 wrote to memory of 2040 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 40 PID 1364 wrote to memory of 2040 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 40 PID 1364 wrote to memory of 2040 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 40 PID 1364 wrote to memory of 2040 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 40 PID 1364 wrote to memory of 2040 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 40 PID 1364 wrote to memory of 2040 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 40 PID 1364 wrote to memory of 2920 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 42 PID 1364 wrote to memory of 2920 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 42 PID 1364 wrote to memory of 2920 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 42 PID 1364 wrote to memory of 2920 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 42 PID 1364 wrote to memory of 2920 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 42 PID 1364 wrote to memory of 2920 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 42 PID 1364 wrote to memory of 2920 1364 ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff3a76a12e9b994de89081909a22da10_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\packet.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:1664
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\pthreadVC.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2256
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\wpcap.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2180
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\drivers\npf.sys /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\npptools.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\drivers\acpidisk.sys /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\wanpacket.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2040
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\Documents and Settings\All Users\¡¸¿ªÊ¼¡¹²Ëµ¥\³ÌÐò\Æô¶¯ /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2920
-