Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2024, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118.exe
-
Size
100KB
-
MD5
5eb5e38603d450c1ef0c730f9de90779
-
SHA1
d945f79cb88ff31ebb9219c78a49fa5918f60a4a
-
SHA256
f393b70b83f103223498574539836accc99da3624b61fa3646354a10e9409292
-
SHA512
87bbdf5e9c768160504f312a6ff3250882145156ed438c29c0b63ce2c026d9bc1f610ba07e87bd708f3259bc956b52a2e5af943a223333ffd5b01512355a376e
-
SSDEEP
1536:vZtLvZKaCkk+t4kxDbV59JAWLYM0vdv8oTdDWeogndoHXPQT3jNwJLb:vPLvH4yR5Ph10vdf/oHqzatb
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2252 4492 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 4492 5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 4492 5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118.exe Token: SeShutdownPrivilege 4492 5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 4492 5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118.exe Token: SeShutdownPrivilege 4492 5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 4492 5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4492 5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 4682⤵
- Program crash
PID:2252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4492 -ip 44921⤵PID:3476