Analysis
-
max time kernel
95s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
26ab629226ce7736357541925bb0c105_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26ab629226ce7736357541925bb0c105_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
26ab629226ce7736357541925bb0c105_JaffaCakes118.exe
-
Size
135KB
-
MD5
26ab629226ce7736357541925bb0c105
-
SHA1
ea4c28222ccdc0d8f9365d92f3df1e625d658dfd
-
SHA256
7dc2f3fb6a57096fa6caa7d0335a57d81c2a842eadf080e2562814dc2996c839
-
SHA512
c67414203e7cf21af848a7ad2d31b456a44978aaea339318ed5e86c189404933bde0790e09673d49fcd2419c8f7bb07f185dadac21fe0fee741b4efeefbc8af8
-
SSDEEP
768:dvp6kfOSCzWGfkyIn4dE4uTVXi8Fdd1d6Ybg/tAXYoZ4unhZRbk6RG3fmyV:dDfOSCH+MuT5BdXd6YgUF4uhZRI62jV
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\eventvwr.msc mmc.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26ab629226ce7736357541925bb0c105_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmc.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeSecurityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: 33 2928 mmc.exe Token: SeIncBasePriorityPrivilege 2928 mmc.exe Token: SeSecurityPrivilege 2928 mmc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4508 mmc.exe 2928 mmc.exe 2928 mmc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2556 wrote to memory of 4508 2556 26ab629226ce7736357541925bb0c105_JaffaCakes118.exe 83 PID 2556 wrote to memory of 4508 2556 26ab629226ce7736357541925bb0c105_JaffaCakes118.exe 83 PID 2556 wrote to memory of 4508 2556 26ab629226ce7736357541925bb0c105_JaffaCakes118.exe 83 PID 4508 wrote to memory of 2928 4508 mmc.exe 86 PID 4508 wrote to memory of 2928 4508 mmc.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\26ab629226ce7736357541925bb0c105_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26ab629226ce7736357541925bb0c105_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\mmc.exemmc.exe /s C:\Windows\system32\eventvwr.msc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\eventvwr.msc" /s C:\Windows\system32\eventvwr.msc3⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2928
-
-