Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 15:44
Static task
static1
Behavioral task
behavioral1
Sample
3ad3b50143b02f9d9c3e8b1a0bb152d9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ad3b50143b02f9d9c3e8b1a0bb152d9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3ad3b50143b02f9d9c3e8b1a0bb152d9_JaffaCakes118.exe
-
Size
793KB
-
MD5
3ad3b50143b02f9d9c3e8b1a0bb152d9
-
SHA1
f8d1ffe33d5743ca297d9c2faab346d5ddb0f24f
-
SHA256
0e37c628909023dde42b088e055dd20945de25266767044cbf6018cbc4959ef3
-
SHA512
29b6259df02d35afd071f17f5d8afb35bcc6cbeb7f0f85ff66c53347d29fa1ba1fcd8be02facfc4d9898063444f90bf50e58335b306c3d8f47e092279f117a01
-
SSDEEP
12288:Y6lgrNZK9jbrW5AwGwHDx1fKI0n5v5RO2tjvP5cU7MoSjS/ddjvqLD/:X+r69/rW5AjixFc5vDO2tRsWJqf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2568 EGUI.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ESET\EGUI.exe 3ad3b50143b02f9d9c3e8b1a0bb152d9_JaffaCakes118.exe File created C:\Program Files (x86)\ESET\EGUI.exe 3ad3b50143b02f9d9c3e8b1a0bb152d9_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ad3b50143b02f9d9c3e8b1a0bb152d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2656 3ad3b50143b02f9d9c3e8b1a0bb152d9_JaffaCakes118.exe Token: SeDebugPrivilege 2568 EGUI.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2752 2568 EGUI.exe 29 PID 2568 wrote to memory of 2752 2568 EGUI.exe 29 PID 2568 wrote to memory of 2752 2568 EGUI.exe 29 PID 2568 wrote to memory of 2752 2568 EGUI.exe 29 PID 2568 wrote to memory of 2752 2568 EGUI.exe 29 PID 2568 wrote to memory of 2752 2568 EGUI.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ad3b50143b02f9d9c3e8b1a0bb152d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ad3b50143b02f9d9c3e8b1a0bb152d9_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
C:\Program Files (x86)\ESET\EGUI.exe"C:\Program Files (x86)\ESET\EGUI.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\WINDOWS\SysWOW64\svchost.exeC:\WINDOWS\system32\svchost.exe2⤵PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
793KB
MD53ad3b50143b02f9d9c3e8b1a0bb152d9
SHA1f8d1ffe33d5743ca297d9c2faab346d5ddb0f24f
SHA2560e37c628909023dde42b088e055dd20945de25266767044cbf6018cbc4959ef3
SHA51229b6259df02d35afd071f17f5d8afb35bcc6cbeb7f0f85ff66c53347d29fa1ba1fcd8be02facfc4d9898063444f90bf50e58335b306c3d8f47e092279f117a01