Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-10-2024 10:08
Static task
static1
Behavioral task
behavioral1
Sample
17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe
-
Size
310KB
-
MD5
17a816a0a61c6f6ba4aa65ce1119fbd9
-
SHA1
74275914fc5b3b202b3d2fa562e3a56eb7b506fc
-
SHA256
706f2056f30039462759d0a8b6bb13cfab88d7f2932be4a7b9e0984255c612fd
-
SHA512
d638acefbd7aee7fb017adb497caa844b7db12a61b1eedc86fb893553d222008e8ece184a49988d93da7e732388ae72dd7f49ca1313e1a5ee9fbc16d7af09300
-
SSDEEP
3072:jiiWLlOXauOjNQIY69vvmMWcwwPjIY69vvmMWcwwPzIY69vvmMWcwwPp:CuZIkrZ6jIkrZ6zIkrZ6
Malware Config
Signatures
-
pid Process 2380 arp.exe 2092 arp.exe 2756 arp.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1076 17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2380 1076 17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe 30 PID 1076 wrote to memory of 2380 1076 17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe 30 PID 1076 wrote to memory of 2380 1076 17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe 30 PID 1076 wrote to memory of 2380 1076 17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe 30 PID 1076 wrote to memory of 2092 1076 17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe 32 PID 1076 wrote to memory of 2092 1076 17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe 32 PID 1076 wrote to memory of 2092 1076 17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe 32 PID 1076 wrote to memory of 2092 1076 17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe 32 PID 1076 wrote to memory of 2756 1076 17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe 34 PID 1076 wrote to memory of 2756 1076 17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe 34 PID 1076 wrote to memory of 2756 1076 17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe 34 PID 1076 wrote to memory of 2756 1076 17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17a816a0a61c6f6ba4aa65ce1119fbd9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\arp.exe"C:\Windows\System32\arp.exe" -a2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Windows\SysWOW64\arp.exe"C:\Windows\System32\arp.exe" -a2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2092
-
-
C:\Windows\SysWOW64\arp.exe"C:\Windows\System32\arp.exe" -a2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2756
-