Analysis
-
max time kernel
134s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
0e952325527bf2eb186c0a1aa45b2296_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0e952325527bf2eb186c0a1aa45b2296_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0e952325527bf2eb186c0a1aa45b2296_JaffaCakes118.exe
-
Size
313KB
-
MD5
0e952325527bf2eb186c0a1aa45b2296
-
SHA1
3611607455b22faad1826b588ae8288e25164d2b
-
SHA256
b763a2f7b76be477fa4f003871f8a6af2181d7f4522eda7e50eb9c7088f4f397
-
SHA512
c07d0bb196bed7de0cfe614a20c428407974bad69ff3bbf2ae6e56254220bffce0c9a727fd0dce578647dba57ca2480dfaebd0cd1be699819444f4617a7ef70a
-
SSDEEP
6144:PLn4UBGqzkq6GN9mzMQrb0V4xF+UXLi5UxDMTWfQxdwNoWHr:zfBG066Qrb0+D+SMWQvwNo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2728 Hacker.com.cn.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Hacker.com.cn.exe 0e952325527bf2eb186c0a1aa45b2296_JaffaCakes118.exe File created C:\Windows\Hacker.com.cn.exe 0e952325527bf2eb186c0a1aa45b2296_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e952325527bf2eb186c0a1aa45b2296_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hacker.com.cn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3028 0e952325527bf2eb186c0a1aa45b2296_JaffaCakes118.exe Token: SeDebugPrivilege 2728 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2696 2728 Hacker.com.cn.exe 31 PID 2728 wrote to memory of 2696 2728 Hacker.com.cn.exe 31 PID 2728 wrote to memory of 2696 2728 Hacker.com.cn.exe 31 PID 2728 wrote to memory of 2696 2728 Hacker.com.cn.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e952325527bf2eb186c0a1aa45b2296_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e952325527bf2eb186c0a1aa45b2296_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
313KB
MD50e952325527bf2eb186c0a1aa45b2296
SHA13611607455b22faad1826b588ae8288e25164d2b
SHA256b763a2f7b76be477fa4f003871f8a6af2181d7f4522eda7e50eb9c7088f4f397
SHA512c07d0bb196bed7de0cfe614a20c428407974bad69ff3bbf2ae6e56254220bffce0c9a727fd0dce578647dba57ca2480dfaebd0cd1be699819444f4617a7ef70a