Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
01e3d17196c576154bad163063c1bedd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01e3d17196c576154bad163063c1bedd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
01e3d17196c576154bad163063c1bedd_JaffaCakes118.exe
-
Size
341KB
-
MD5
01e3d17196c576154bad163063c1bedd
-
SHA1
cb16594293547d6f365b3ad470bb6ecbbbdc2d55
-
SHA256
e5bbd81cfcf1f34c966a2e4ef797174e29bbab581e5955643379b4c363042c1b
-
SHA512
d0bc8e27355cab4e17f222d3cc6e35d999a3d7c459e25e6ebf5dfe38ef5c45fdbec38aa0f8fd9e468ae7fb29b601529428f9c200c580b89ff2d9b781c761d157
-
SSDEEP
6144:tZpclA4kUrIPyMTDEwhdHe3BGdUZX1WIqgqwxVOSfGW6xfdYR8JY/wmxc1QvGmmD:trclANyIjTgwb+AdUzBqoPfGbRi3/wCm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2532 ctfmon.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ctfmon.exe 01e3d17196c576154bad163063c1bedd_JaffaCakes118.exe File opened for modification C:\Windows\ctfmon.exe 01e3d17196c576154bad163063c1bedd_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01e3d17196c576154bad163063c1bedd_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1168 01e3d17196c576154bad163063c1bedd_JaffaCakes118.exe Token: SeDebugPrivilege 2532 ctfmon.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 ctfmon.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1892 2532 ctfmon.exe 32 PID 2532 wrote to memory of 1892 2532 ctfmon.exe 32 PID 2532 wrote to memory of 1892 2532 ctfmon.exe 32 PID 2532 wrote to memory of 1892 2532 ctfmon.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\01e3d17196c576154bad163063c1bedd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01e3d17196c576154bad163063c1bedd_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
C:\Windows\ctfmon.exeC:\Windows\ctfmon.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341KB
MD501e3d17196c576154bad163063c1bedd
SHA1cb16594293547d6f365b3ad470bb6ecbbbdc2d55
SHA256e5bbd81cfcf1f34c966a2e4ef797174e29bbab581e5955643379b4c363042c1b
SHA512d0bc8e27355cab4e17f222d3cc6e35d999a3d7c459e25e6ebf5dfe38ef5c45fdbec38aa0f8fd9e468ae7fb29b601529428f9c200c580b89ff2d9b781c761d157