Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
440c1d4a557a054817f134eaf1893292_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
440c1d4a557a054817f134eaf1893292_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
440c1d4a557a054817f134eaf1893292_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
440c1d4a557a054817f134eaf1893292
-
SHA1
3a906572e202c98afebca711eb1d4db0e98b30ea
-
SHA256
4712cd809e42ac7ea3ef57f2ccf8ff2861c8e85f87e48999d71f6b1769246509
-
SHA512
a118047920fd8e477d54dd626e7a33d54fef4356aa8fc15365859868b311bc12a6a306f6541d299bf801539252836b63a850d6497ca1d07af5de54dbf0fa1088
-
SSDEEP
24576:EZqLaF4PGweL2ak8htfBeozEfN5ZBhs1ZBdvlK4HeZU+yu5K8hWGvJGbWJOXlOiE:OqLay+weL2AxiyuSmtJ4ZCj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 440c1d4a557a054817f134eaf1893292_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1332 440c1d4a557a054817f134eaf1893292_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1332 440c1d4a557a054817f134eaf1893292_JaffaCakes118.exe 1332 440c1d4a557a054817f134eaf1893292_JaffaCakes118.exe 1332 440c1d4a557a054817f134eaf1893292_JaffaCakes118.exe 1332 440c1d4a557a054817f134eaf1893292_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\440c1d4a557a054817f134eaf1893292_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\440c1d4a557a054817f134eaf1893292_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1332