Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 07:18
Static task
static1
Behavioral task
behavioral1
Sample
0e8bf75e3f8b2c85945c58eeb7f1afad_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e8bf75e3f8b2c85945c58eeb7f1afad_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0e8bf75e3f8b2c85945c58eeb7f1afad_JaffaCakes118.exe
-
Size
65KB
-
MD5
0e8bf75e3f8b2c85945c58eeb7f1afad
-
SHA1
b0547ff2044626f297d98438c687a1df40b1d41e
-
SHA256
6bf547f17002fd30de282700abf494e7e0766f3ab09918c5c919c728c1cd62ef
-
SHA512
9af55554215a595ef8a8dbb614af73afc2b4056d979ec1ce5956b5a9124e75e36353bd7fde94018729e70bfa9bcc95a5432af4dd02de84f561f0efa720b1f17f
-
SSDEEP
1536:4bl0zZ/iCw59di8LBFK7DIzfdC8l9C5xh3x:00zZqhdimwUs8lM5xz
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
description ioc Process File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\xE5a5k.dll 0e8bf75e3f8b2c85945c58eeb7f1afad_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2140 Process not Found -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\xE5a5k.dll 0e8bf75e3f8b2c85945c58eeb7f1afad_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e8bf75e3f8b2c85945c58eeb7f1afad_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e8bf75e3f8b2c85945c58eeb7f1afad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e8bf75e3f8b2c85945c58eeb7f1afad_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Print Processors
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5ac5e98d10150efec0ccc719df7a18be9
SHA1e5e61e2043b2aab2a7bdc28e437508060f786664
SHA256cc6077ca6df1d902c4066a567fdd31a93d4fe9bd1d574c534b030533312ba40f
SHA512d2e544923fa19def5fea336b292f6788abdfcbe9a70f041b334c09ca745715ac860dfc639e20cd1cc75f207b2ced08559efae93d4065e2909f0f621a069af1e0