Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe
-
Size
460KB
-
MD5
2fd4574410dcc58ba7db356c2c2f2394
-
SHA1
ee16178e74d59a8888dea2ac77bdc6619d383cb9
-
SHA256
7cc662404c49ab5eab63bdaa6addc3f7455e74d6448a86ac7d56b3de5477c9a0
-
SHA512
9807a6254b8bc8b52596bd5e29c917ff9d34e5be6c10039482cb0232938935dc7c1ad0e050ad752c1f2a16eacb9b968e4ce22a506276c70c8ddcfec638daff85
-
SSDEEP
6144:0XP2VguYIgrGRq6tHPbhpDEOb59H7wsh2iESrhtiJg3BGVP0SLDFEpojsJOY0:KkgrL6tAOb7H7jcSrDiWGVMUEpojsJq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2440 zsiilitzcpioq.exe -
Loads dropped DLL 2 IoCs
pid Process 1716 2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe 1716 2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main zsiilitzcpioq.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2440 zsiilitzcpioq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2440 zsiilitzcpioq.exe 2440 zsiilitzcpioq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2440 1716 2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe 30 PID 1716 wrote to memory of 2440 1716 2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe 30 PID 1716 wrote to memory of 2440 1716 2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe 30 PID 1716 wrote to memory of 2440 1716 2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2fd4574410dcc58ba7db356c2c2f2394_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\mgisajvngqihim\zsiilitzcpioq.exe"C:\Users\Admin\AppData\Local\Temp\mgisajvngqihim\zsiilitzcpioq.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
460KB
MD52fd4574410dcc58ba7db356c2c2f2394
SHA1ee16178e74d59a8888dea2ac77bdc6619d383cb9
SHA2567cc662404c49ab5eab63bdaa6addc3f7455e74d6448a86ac7d56b3de5477c9a0
SHA5129807a6254b8bc8b52596bd5e29c917ff9d34e5be6c10039482cb0232938935dc7c1ad0e050ad752c1f2a16eacb9b968e4ce22a506276c70c8ddcfec638daff85
-
Filesize
7KB
MD5ed9f29dcad3d7177bb3a022a6148dbe9
SHA1c13ff13952181c5aa5137c6bc1cddb924abacd33
SHA256d29936029335e8eddb46e1c1f0b34ab469e78c7f3c4cf807264d50291726ef14
SHA51221508b7a1ebff3aa167b35bebb8c6ca2e32089443c6a6fbd9456720038a6b94a891491c436cba1658e8c40022749cc11b48da69464b2a90b57ba87989bb02198