Analysis
-
max time kernel
20s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 23:24
Static task
static1
Behavioral task
behavioral1
Sample
54353c5166d33616ef2a8f649fcdc86b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54353c5166d33616ef2a8f649fcdc86b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
54353c5166d33616ef2a8f649fcdc86b_JaffaCakes118.exe
-
Size
19KB
-
MD5
54353c5166d33616ef2a8f649fcdc86b
-
SHA1
68b6ae842f11a9ecfaf1de32587d9a32d8546480
-
SHA256
42594686a79a70df9b09ef8600830d10b11a795bf146c0ca5f23df8a4907287c
-
SHA512
46bd66196343178b89331ceb712de152f94d3787e77381f22ea2078128f53023db53af210481695935490f88533a010a6979064c4264976f103dacc1b61b60c4
-
SSDEEP
384:TfsbwoOg/YYaNjv0EmHThh4WWieZWnT2tZHQI:Ls0oOg/YYa9v4zhhdejHwI
Malware Config
Signatures
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54353c5166d33616ef2a8f649fcdc86b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1600 54353c5166d33616ef2a8f649fcdc86b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1600 54353c5166d33616ef2a8f649fcdc86b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54353c5166d33616ef2a8f649fcdc86b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\54353c5166d33616ef2a8f649fcdc86b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600