Analysis
-
max time kernel
67s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 00:46
Static task
static1
Behavioral task
behavioral1
Sample
a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe
-
Size
796KB
-
MD5
a504bebf521d37c232e916222cca5aae
-
SHA1
ddfdfdac50c7c098e0e816ca2408ceb9b20191eb
-
SHA256
853174f43d5517068fc0c16ee89566e5451417d1481ca040f9a2b58d1a7ba7c6
-
SHA512
73989c8a5247a04105c42cddd3723958176e6f249ce6645b33216b9d4b6466539694c7f3983b68f2056ca227f35c8f358cd90eb781ff51db880e75dc95c59ace
-
SSDEEP
12288:u8FRcl4t2NjFmzPpcvVr8j7PvQ1TCBfZg5CDeMxNj923dfak/D/hWOeB7Mzp3:ukRcuMNjUcv6Y1TUyKeMxNB6BF/hoBe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2692 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2692 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2692 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2692 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2736 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 31 PID 2772 wrote to memory of 2736 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 31 PID 2772 wrote to memory of 2736 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 31 PID 2772 wrote to memory of 2736 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 31 PID 2772 wrote to memory of 2784 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 32 PID 2772 wrote to memory of 2784 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 32 PID 2772 wrote to memory of 2784 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 32 PID 2772 wrote to memory of 2784 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 32 PID 2772 wrote to memory of 1688 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 33 PID 2772 wrote to memory of 1688 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 33 PID 2772 wrote to memory of 1688 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 33 PID 2772 wrote to memory of 1688 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 33 PID 2772 wrote to memory of 1912 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 34 PID 2772 wrote to memory of 1912 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 34 PID 2772 wrote to memory of 1912 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 34 PID 2772 wrote to memory of 1912 2772 a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe"2⤵PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe"2⤵PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe"2⤵PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe"2⤵PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a504bebf521d37c232e916222cca5aae_JaffaCakes118.exe"2⤵PID:1912
-