Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 07:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe
-
Size
334KB
-
MD5
0aa5a8919abea0c1ec20125a4d05bc7a
-
SHA1
90cf195216ff218e046705c484a8d02d07824e3a
-
SHA256
27f0c0c257fbcbc09ce0ccb232929816269bf9a671dedc6f31ca5ebb3d7a3f23
-
SHA512
882e5fb4cbf6808fc8a0424a632006a1cc254dd6425ea3ea78a793161d24c49d62340c14ad979333b1af8c16ebd875d1dc04a84bbe24f3a5e77dde0f8930c075
-
SSDEEP
6144:63YdZV2YdagKMm0SAeHlj/oLJNvUxfPSZeKfcc3:zjV1MrMm0SAyzmJqxOfc4
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2896 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 31 PID 1916 wrote to memory of 2896 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 31 PID 1916 wrote to memory of 2896 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 31 PID 1916 wrote to memory of 2896 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 31 PID 1916 wrote to memory of 2992 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 32 PID 1916 wrote to memory of 2992 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 32 PID 1916 wrote to memory of 2992 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 32 PID 1916 wrote to memory of 2992 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 32 PID 1916 wrote to memory of 2912 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 33 PID 1916 wrote to memory of 2912 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 33 PID 1916 wrote to memory of 2912 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 33 PID 1916 wrote to memory of 2912 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 33 PID 1916 wrote to memory of 2916 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 34 PID 1916 wrote to memory of 2916 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 34 PID 1916 wrote to memory of 2916 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 34 PID 1916 wrote to memory of 2916 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 34 PID 1916 wrote to memory of 2632 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 35 PID 1916 wrote to memory of 2632 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 35 PID 1916 wrote to memory of 2632 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 35 PID 1916 wrote to memory of 2632 1916 JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe"2⤵PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe"2⤵PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe"2⤵PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe"2⤵PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0aa5a8919abea0c1ec20125a4d05bc7a.exe"2⤵PID:2632
-