Analysis
-
max time kernel
18s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
26ab629226ce7736357541925bb0c105_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26ab629226ce7736357541925bb0c105_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
26ab629226ce7736357541925bb0c105_JaffaCakes118.exe
-
Size
135KB
-
MD5
26ab629226ce7736357541925bb0c105
-
SHA1
ea4c28222ccdc0d8f9365d92f3df1e625d658dfd
-
SHA256
7dc2f3fb6a57096fa6caa7d0335a57d81c2a842eadf080e2562814dc2996c839
-
SHA512
c67414203e7cf21af848a7ad2d31b456a44978aaea339318ed5e86c189404933bde0790e09673d49fcd2419c8f7bb07f185dadac21fe0fee741b4efeefbc8af8
-
SSDEEP
768:dvp6kfOSCzWGfkyIn4dE4uTVXi8Fdd1d6Ybg/tAXYoZ4unhZRbk6RG3fmyV:dDfOSCH+MuT5BdXd6YgUF4uhZRI62jV
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\eventvwr.msc mmc.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26ab629226ce7736357541925bb0c105_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmc.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeSecurityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: 33 2852 mmc.exe Token: SeIncBasePriorityPrivilege 2852 mmc.exe Token: SeSecurityPrivilege 2852 mmc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2296 mmc.exe 2852 mmc.exe 2852 mmc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 904 wrote to memory of 2296 904 26ab629226ce7736357541925bb0c105_JaffaCakes118.exe 29 PID 904 wrote to memory of 2296 904 26ab629226ce7736357541925bb0c105_JaffaCakes118.exe 29 PID 904 wrote to memory of 2296 904 26ab629226ce7736357541925bb0c105_JaffaCakes118.exe 29 PID 904 wrote to memory of 2296 904 26ab629226ce7736357541925bb0c105_JaffaCakes118.exe 29 PID 2296 wrote to memory of 2852 2296 mmc.exe 30 PID 2296 wrote to memory of 2852 2296 mmc.exe 30 PID 2296 wrote to memory of 2852 2296 mmc.exe 30 PID 2296 wrote to memory of 2852 2296 mmc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\26ab629226ce7736357541925bb0c105_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26ab629226ce7736357541925bb0c105_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\mmc.exemmc.exe /s C:\Windows\system32\eventvwr.msc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\eventvwr.msc" /s C:\Windows\system32\eventvwr.msc3⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2852
-
-