Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 06:56
Static task
static1
Behavioral task
behavioral1
Sample
38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe
-
Size
146KB
-
MD5
38e961ac644b57fa0588e4907ea14271
-
SHA1
9d3d6f3bf2a29b8dde7d615e62efb63c45178e3d
-
SHA256
9410995f6a038b9e3ccaaf27f8c572a063f1986ee2624f43f94c9006ea1ebbc4
-
SHA512
90103006dbb0c2444a3028a0cdc4e9c514da113cbc55e0455653ee2a5d9d6f75b437d60fb9275dcbbeb30c80e46238e00664c2276fac9e69fe6326e479731622
-
SSDEEP
3072:XX78TyX8zuj6MCEmVChZUIVBM9wb8Nj8l4Qb3IjHqGB8lCZBte/SHWfRgN:axqxyIH+w5b38B8lCduS2fRgN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2552 iexplore.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\execag = "\"C:\\Users\\Admin\\AppData\\Roaming\\execag.exe\" -autorun" iexplore.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2676 set thread context of 1592 2676 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1592 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2676 wrote to memory of 1592 2676 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 30 PID 2676 wrote to memory of 1592 2676 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 30 PID 2676 wrote to memory of 1592 2676 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 30 PID 2676 wrote to memory of 1592 2676 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 30 PID 2676 wrote to memory of 1592 2676 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 30 PID 2676 wrote to memory of 1592 2676 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 30 PID 2676 wrote to memory of 1592 2676 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 30 PID 2676 wrote to memory of 1592 2676 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 30 PID 2676 wrote to memory of 1592 2676 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 30 PID 2676 wrote to memory of 1592 2676 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 30 PID 2676 wrote to memory of 1592 2676 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 30 PID 1592 wrote to memory of 2552 1592 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 31 PID 1592 wrote to memory of 2552 1592 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 31 PID 1592 wrote to memory of 2552 1592 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 31 PID 1592 wrote to memory of 2552 1592 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 31 PID 1592 wrote to memory of 2552 1592 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 31 PID 1592 wrote to memory of 2552 1592 38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe 31 PID 2552 wrote to memory of 1196 2552 iexplore.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\38e961ac644b57fa0588e4907ea14271_JaffaCakes118.exe"3⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
- Deletes itself
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552
-
-
-