Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 10:21
Behavioral task
behavioral1
Sample
21066c00de752ffa1fe224ba7fc5853c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
21066c00de752ffa1fe224ba7fc5853c_JaffaCakes118.exe
-
Size
760KB
-
MD5
21066c00de752ffa1fe224ba7fc5853c
-
SHA1
05fa88cf992a0a5c3872a5a3814e82de21c398e0
-
SHA256
004c48195399bc6471e98e129bf98e7a6d21560107fcdb2ac58c7644770e4112
-
SHA512
de1d800ce0510817ce5eff866a43eb2439d8309ba5e27e23b45bedd3649685d781e4f34ccb7a5c86bf17698c54d843f7b07cd4d68446ffd5c9bae5cf6e070b1f
-
SSDEEP
12288:h4dMRU/UP4heFjLDFtvoSZiUXZRY49SA7GI/p7a6o2Mhi9Byu8QFIAaWfaydp9pB:qwU/UwhWv1XZpSRSJo2xByuPIA7Pdp9b
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 580 7za.exe 2632 Server.exe -
resource yara_rule behavioral2/memory/3544-0-0x0000000000400000-0x0000000000484000-memory.dmp upx behavioral2/memory/3544-18-0x0000000000400000-0x0000000000484000-memory.dmp upx behavioral2/memory/3544-20-0x0000000000400000-0x0000000000484000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21066c00de752ffa1fe224ba7fc5853c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: 33 2632 Server.exe Token: SeIncBasePriorityPrivilege 2632 Server.exe Token: SeIncreaseQuotaPrivilege 2632 Server.exe Token: SeSecurityPrivilege 2632 Server.exe Token: SeTakeOwnershipPrivilege 2632 Server.exe Token: SeLoadDriverPrivilege 2632 Server.exe Token: SeSystemProfilePrivilege 2632 Server.exe Token: SeSystemtimePrivilege 2632 Server.exe Token: SeProfSingleProcessPrivilege 2632 Server.exe Token: SeIncBasePriorityPrivilege 2632 Server.exe Token: SeCreatePagefilePrivilege 2632 Server.exe Token: SeBackupPrivilege 2632 Server.exe Token: SeRestorePrivilege 2632 Server.exe Token: SeShutdownPrivilege 2632 Server.exe Token: SeDebugPrivilege 2632 Server.exe Token: SeSystemEnvironmentPrivilege 2632 Server.exe Token: SeChangeNotifyPrivilege 2632 Server.exe Token: SeRemoteShutdownPrivilege 2632 Server.exe Token: SeUndockPrivilege 2632 Server.exe Token: SeManageVolumePrivilege 2632 Server.exe Token: SeImpersonatePrivilege 2632 Server.exe Token: SeCreateGlobalPrivilege 2632 Server.exe Token: 33 2632 Server.exe Token: 34 2632 Server.exe Token: 35 2632 Server.exe Token: 36 2632 Server.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3544 wrote to memory of 3776 3544 21066c00de752ffa1fe224ba7fc5853c_JaffaCakes118.exe 86 PID 3544 wrote to memory of 3776 3544 21066c00de752ffa1fe224ba7fc5853c_JaffaCakes118.exe 86 PID 3544 wrote to memory of 3776 3544 21066c00de752ffa1fe224ba7fc5853c_JaffaCakes118.exe 86 PID 3776 wrote to memory of 580 3776 cmd.exe 89 PID 3776 wrote to memory of 580 3776 cmd.exe 89 PID 3776 wrote to memory of 580 3776 cmd.exe 89 PID 3544 wrote to memory of 2632 3544 21066c00de752ffa1fe224ba7fc5853c_JaffaCakes118.exe 91 PID 3544 wrote to memory of 2632 3544 21066c00de752ffa1fe224ba7fc5853c_JaffaCakes118.exe 91 PID 3544 wrote to memory of 2632 3544 21066c00de752ffa1fe224ba7fc5853c_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\21066c00de752ffa1fe224ba7fc5853c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21066c00de752ffa1fe224ba7fc5853c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\7za.exe" "x" "-y" "C:\Users\Admin\AppData\Roaming\Server.7z" "-pHVLnt5Dy""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Roaming\7za.exe"C:\Users\Admin\AppData\Roaming\7za.exe" "x" "-y" "C:\Users\Admin\AppData\Roaming\Server.7z" "-pHVLnt5Dy"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:580
-
-
-
C:\Users\Admin\AppData\Roaming\Server.exeC:\Users\Admin\AppData\Roaming\Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5e3afe3da16ae5a60ca61a3ad05a2a0a8
SHA1e9be371ec434dbc617541ff8a0cc7f3cd4dc5e40
SHA256a5ebb2c8b1cf3c4fef62bf6f70c2fa5a89f6cc39994239ef176980172df93022
SHA512c04f1cb701c70ecd79d4e29ddd99cac3a3fb36214b59e285eeeeba8fdaf21a8cac74cec7bd6fe7d96946dd5e031cfe7a93aa6eea9af8d47bd234501cd865a452
-
Filesize
574KB
MD542badc1d2f03a8b1e4875740d3d49336
SHA1cee178da1fb05f99af7a3547093122893bd1eb46
SHA256c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf
SHA5126bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c
-
Filesize
224KB
MD54d2f2b38dab211c715a08d5904325f6d
SHA1eec185bdc7d2a4774d2aa1c62d1ece95a9de3e69
SHA2565ca238fab814e7a3447ceb0ea7bf080cad4e8ebd40b031c3193af2e16c548ac8
SHA5124d620e5d1e9ea9bcee138ad7fedf77811184f5b7b0d661e0eaa661158266c0c66e1c50765a77f1254d3c28bd64b4690ac94b973af17bb817608aebead26610c9