Analysis
-
max time kernel
92s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
0c0b1776466515da822644b60d9a428a
-
SHA1
6be48133dcefa3a5a2a700e34734127799790bf9
-
SHA256
6ac1498e402c76526d269b65f60d1734d299c9bb4d257ce8803db5a33cbc504f
-
SHA512
4603ad8a300031cd2d89fb998efb8eae88b830f9bce55b5b5f767a70654a5b0e13a590d48cd4fef4dba816decc46aebc53f6ada3755cbfbf4ab7bd97dee6b160
-
SSDEEP
49152:vAyzOBI5jhmEz06sWJVFiQfhpueQap1HXIJB:vxOBI58Ez0NWJT6eQap1HXIJB
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key security queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeSecurityPrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeSystemtimePrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeBackupPrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeRestorePrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeShutdownPrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeDebugPrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeUndockPrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeManageVolumePrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeImpersonatePrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: 33 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: 34 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: 35 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe Token: 36 2344 0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c0b1776466515da822644b60d9a428a_JaffaCakes118.exe"1⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2344