Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 00:26
Behavioral task
behavioral1
Sample
59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe
-
Size
691KB
-
MD5
59f85e1571d516bbfaf9c41c4be824e4
-
SHA1
9a7b9d02669f602880731f78f30fa345e73a59e4
-
SHA256
f51307caedc66a9705be35506f8a0544eef3234a8f09cd2a76773eb6767777ce
-
SHA512
af302adf49464926823466a92a807af40d54056b55dec282b79ade4d8b202d96f83bca99acaf3c28b51c464908778ab783a309d473ce998f7e5821b7ceeaaf75
-
SSDEEP
12288:TXMJVHMxtDaSm3TJvVNvWV5YTsY7tHwbz/hYfcoyoKENGz7iG/gpr:7+sWSm39NNv9wY7tHwbWfYoKECPe
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
notepad.exe59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exedescription pid Process Token: SeIncreaseQuotaPrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeSecurityPrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeSystemtimePrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeBackupPrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeRestorePrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeShutdownPrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeDebugPrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeUndockPrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeManageVolumePrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeImpersonatePrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: 33 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: 34 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe Token: 35 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exedescription pid Process procid_target PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2988 2384 59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59f85e1571d516bbfaf9c41c4be824e4_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- System Location Discovery: System Language Discovery
PID:2988
-