Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
3b0e5b8ac1971200b0c25eaeffe5b9a9_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3b0e5b8ac1971200b0c25eaeffe5b9a9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3b0e5b8ac1971200b0c25eaeffe5b9a9_JaffaCakes118.exe
-
Size
745KB
-
MD5
3b0e5b8ac1971200b0c25eaeffe5b9a9
-
SHA1
285857d9bf4c33f11f2eb34d3c5f3264cbc39b26
-
SHA256
c559f236c7d6d8cbb3e7f3c5ad617feafc5802b2b9fae8ece1275d4a7c3f1334
-
SHA512
04bf190490e930ea641aab76f63237ba2e6c420825e9f3a0d3bb294233e4888440e647e6b3a035e326249ee2e44541c56caa0e443a2837758b40b1a02a05b494
-
SSDEEP
12288:5hySQ5eh7sU1x657THIZS+WKPhKSfsNFLL4GlB1yb46SsOgY7dptDvSGmxGQHj:/yLexsSx65HHYjPPhKSalibTSbg4xDvi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2764 Hacker.com.cn.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe 3b0e5b8ac1971200b0c25eaeffe5b9a9_JaffaCakes118.exe File opened for modification C:\Windows\Hacker.com.cn.exe 3b0e5b8ac1971200b0c25eaeffe5b9a9_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b0e5b8ac1971200b0c25eaeffe5b9a9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hacker.com.cn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2724 3b0e5b8ac1971200b0c25eaeffe5b9a9_JaffaCakes118.exe Token: SeDebugPrivilege 2764 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2144 2764 Hacker.com.cn.exe 32 PID 2764 wrote to memory of 2144 2764 Hacker.com.cn.exe 32 PID 2764 wrote to memory of 2144 2764 Hacker.com.cn.exe 32 PID 2764 wrote to memory of 2144 2764 Hacker.com.cn.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b0e5b8ac1971200b0c25eaeffe5b9a9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b0e5b8ac1971200b0c25eaeffe5b9a9_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
745KB
MD53b0e5b8ac1971200b0c25eaeffe5b9a9
SHA1285857d9bf4c33f11f2eb34d3c5f3264cbc39b26
SHA256c559f236c7d6d8cbb3e7f3c5ad617feafc5802b2b9fae8ece1275d4a7c3f1334
SHA51204bf190490e930ea641aab76f63237ba2e6c420825e9f3a0d3bb294233e4888440e647e6b3a035e326249ee2e44541c56caa0e443a2837758b40b1a02a05b494