Analysis
-
max time kernel
92s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
1581dcba3c9ed9ecde6506e7a105c71a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1581dcba3c9ed9ecde6506e7a105c71a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1581dcba3c9ed9ecde6506e7a105c71a_JaffaCakes118.exe
-
Size
65KB
-
MD5
1581dcba3c9ed9ecde6506e7a105c71a
-
SHA1
a32fa59af3691a4d4f759897aad040e5e23dca20
-
SHA256
ab6f12c1ecd3c4cc8957b537b8c71d85505e3623a734a68e1988f129f112ad7c
-
SHA512
44319ff91ea838d866a64c9ba8118f0ee04433854599ccfbf61ebe152f2bce368ff1aad014d94abb8cb1da2221daf44ebdd5c3135a75d1b4c6788d0b074c6f37
-
SSDEEP
768:5fVvcgfxCWLvBlHa4LIushRaDkJ23Gj3TEJdeQaOmb1wkGq6+sQCGVjdrcPK3Qm:9Jx5XaPIDu2WzT6eQa9EwCGdOPK3x
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
description ioc Process File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\xm3gMYWSK9.dll 1581dcba3c9ed9ecde6506e7a105c71a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1720 Process not Found -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\xm3gMYWSK9.dll 1581dcba3c9ed9ecde6506e7a105c71a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1581dcba3c9ed9ecde6506e7a105c71a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1581dcba3c9ed9ecde6506e7a105c71a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1581dcba3c9ed9ecde6506e7a105c71a_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Print Processors
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5ab9a4f4df517d9ba2ccea85dbddb2a1d
SHA18c8bc81983d42d4dd541b354bce99a7329b84e75
SHA256791e7670be7e3b022f2fef9bf87499a3dfc9f31b02155a842cbc723a7e24881c
SHA5128b7c1a46b042a0548bce84688909b6b4dd2b723aa6bc462253bbc91ad187ac8e9d56ae6ff095840adceb2860dda0745da7b9c779d21aa6a3356be416cedf0cd2