Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 02:05
Static task
static1
Behavioral task
behavioral1
Sample
086041575642ccd128650ce5d7e4b308_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
086041575642ccd128650ce5d7e4b308_JaffaCakes118.exe
-
Size
842KB
-
MD5
086041575642ccd128650ce5d7e4b308
-
SHA1
483c612c73f48c4c7e4969e685eea6ae37cd84ae
-
SHA256
0ab2a69f9b8823ad7bade12fff6311f8ff137ccf1f79ab4ca5bed7ea392ca96f
-
SHA512
bc7549be0176aa6ec0c2d6c5480617c894e1b4ca5b385d6bdef3cfbf0a8d821501c86a73eafd0c80cd6a43229c108bec998c6caacb0b0b451fb9deec83189fa0
-
SSDEEP
24576:lYC9bCVicd08lfEeA2hzXYtwNVoocec9R/XB:lYC9bCVLy8l5XYtqxc9hB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2924 360sefa.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\360sefa.exe 086041575642ccd128650ce5d7e4b308_JaffaCakes118.exe File opened for modification C:\Windows\360sefa.exe 086041575642ccd128650ce5d7e4b308_JaffaCakes118.exe File created C:\Windows\360sefa.DLL 360sefa.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 086041575642ccd128650ce5d7e4b308_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 360sefa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2924 360sefa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2924 360sefa.exe 2924 360sefa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\086041575642ccd128650ce5d7e4b308_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\086041575642ccd128650ce5d7e4b308_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1960
-
C:\Windows\360sefa.exeC:\Windows\360sefa.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
842KB
MD5086041575642ccd128650ce5d7e4b308
SHA1483c612c73f48c4c7e4969e685eea6ae37cd84ae
SHA2560ab2a69f9b8823ad7bade12fff6311f8ff137ccf1f79ab4ca5bed7ea392ca96f
SHA512bc7549be0176aa6ec0c2d6c5480617c894e1b4ca5b385d6bdef3cfbf0a8d821501c86a73eafd0c80cd6a43229c108bec998c6caacb0b0b451fb9deec83189fa0