Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 06:17
Static task
static1
Behavioral task
behavioral1
Sample
84de3e6134b5f3dfd61257f71a7f9902_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
84de3e6134b5f3dfd61257f71a7f9902_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
84de3e6134b5f3dfd61257f71a7f9902_JaffaCakes118.exe
-
Size
628KB
-
MD5
84de3e6134b5f3dfd61257f71a7f9902
-
SHA1
0db2f64b08d3052df7a9dd636ccc81524bfc313a
-
SHA256
b3da524580e20ead72a0c82fdb7f0ea41642369214a52410ed3cebef9f8aad9d
-
SHA512
30f58f5c3ee01a33ca1d3b09bd27ca17b29f05249df64f63a954a41b3445ee4aaf3de59fb3a744139727eaa334c8f54007cdd96f4ce8c0422bdc6579463672ef
-
SSDEEP
6144:4OHFxt5qY+sUi+rBCJbE0UAzESR/+cTk44N4cTocz65MpCqbTduVFmEEnhL4fbk:7HF5qdq+rAo0UAzrm6EPCqfQUV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
84de3e6134b5f3dfd61257f71a7f9902_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84de3e6134b5f3dfd61257f71a7f9902_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 3152 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3152 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
84de3e6134b5f3dfd61257f71a7f9902_JaffaCakes118.exepid process 3364 84de3e6134b5f3dfd61257f71a7f9902_JaffaCakes118.exe 3364 84de3e6134b5f3dfd61257f71a7f9902_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84de3e6134b5f3dfd61257f71a7f9902_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\84de3e6134b5f3dfd61257f71a7f9902_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3364
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3f4 0x5141⤵
- Suspicious use of AdjustPrivilegeToken
PID:3152