Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 06:14
Static task
static1
Behavioral task
behavioral1
Sample
094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
094467c0cd7bcf96768b19825abe08ec
-
SHA1
5fcd697925233ee2b77e07eed9deea3d4a156022
-
SHA256
783c7f6f9176e1c1a622db5afe6283e3dc96ca7d9605d490b001a5adc1c9b6c2
-
SHA512
8ee0ce7959741ec94643b495f7117ac54f8dec6407090bdea78a5f63e4e7f3dfc00300f6e5b7526222fd541674993e400b4d98506531a27b72ae053b07ad3458
-
SSDEEP
24576:YSKQK7S4It1Gv41jqJNFCJHsHDSXO0Hs/DsVu0CCZIhm6heQpAeVwNbixQvbqfyH:YSKQOSt0w1q9iHVXO0HkDsVZCSUm6vpj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2864 update.exe -
Loads dropped DLL 6 IoCs
pid Process 2100 094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe 2100 094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe 2864 update.exe 2864 update.exe 2864 update.exe 2864 update.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\setupapi.log update.exe File opened for modification \??\c:\windows\KB938464.log update.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeRestorePrivilege 2864 update.exe Token: SeRestorePrivilege 2864 update.exe Token: SeRestorePrivilege 2864 update.exe Token: SeRestorePrivilege 2864 update.exe Token: SeRestorePrivilege 2864 update.exe Token: SeRestorePrivilege 2864 update.exe Token: SeRestorePrivilege 2864 update.exe Token: SeBackupPrivilege 2864 update.exe Token: SeRestorePrivilege 2864 update.exe Token: SeShutdownPrivilege 2864 update.exe Token: SeSecurityPrivilege 2864 update.exe Token: SeTakeOwnershipPrivilege 2864 update.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2864 2100 094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2864 2100 094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2864 2100 094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2864 2100 094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2864 2100 094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2864 2100 094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2864 2100 094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\094467c0cd7bcf96768b19825abe08ec_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\307f9c5264e1125611\update\update.exec:\307f9c5264e1125611\update\update.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5ee207e35aea4d5df41d90221e1b66efa
SHA1757469cf9ad2f21f267bbe730560114fdf8a89a5
SHA256cf64c95e9a2d02967efc22b00efb3736156b913a95231eb63c1df45d43475e64
SHA51243e9f75725daa4f3428b2d9cee2c2cc8b2f2e991b8e58d72d2f429fbdfb614c86d172f03d3f9da98756bd4e245643d9a57c6efa422d6c60ad364a2322245542d
-
Filesize
712KB
MD59570121468658dcc6972f1dfa624a223
SHA161716952df7a03fc01ac919f44f07e9588840b8c
SHA256bc2cde5db3027a726c81df78bdef10b5ec9a7b4a5ba297911c7b999638f76b33
SHA5127c2168a6db5bf7dd7c09682983e9059524621834d0d9ae250382c74d714b0e99b625f5ee9a648e18de9fa25b580bac5ab770ad63c406a9f88c87ade1a372429c
-
Filesize
331KB
MD5eb5c64286d987337f702813e73fcf615
SHA177c393b4cf5b61c29afa408ec1ebd93b22271e3f
SHA25644062d8525a1de307491a46376d1831e23c27c18edb3de8f142d83eb7a21fc52
SHA5120c71779a7b5a3507b5d0ccc0f9ff785032e1d8c32e76a0c0acadfd531d9ca87b61fd9742d69c610823a4315e181ad41f561811badbc262052d0f3ba86b9237a6