Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 13:41
Static task
static1
Behavioral task
behavioral1
Sample
402c7177787d1c00576ac7eecf3d880e_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
402c7177787d1c00576ac7eecf3d880e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
402c7177787d1c00576ac7eecf3d880e_JaffaCakes118.exe
-
Size
524KB
-
MD5
402c7177787d1c00576ac7eecf3d880e
-
SHA1
083e9e71beddbdb0ad9ea0019d6bca79da58419b
-
SHA256
af1986a767933ed81b9f8d6db2b590ef94de25b3f3781ca9e59ce3916d28c8ae
-
SHA512
f7b86e48def4df8eea2c33d2dcf30ee954c31cd60c51585b72c40827814af7661220cf5a7943f5b489ca9c68e23348ba73aa3c0935b03fa4422c67508bb64267
-
SSDEEP
12288:yHfd0jnsDoIuwZKpCvX+UUYNKLh2g5teC:MFIsMKKY+UjkLhhSC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 402c7177787d1c00576ac7eecf3d880e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4656 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4656 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\402c7177787d1c00576ac7eecf3d880e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\402c7177787d1c00576ac7eecf3d880e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3572
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a4 0x2ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4656