Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 11:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe
Resource
win7-20241023-en
windows7-x64
4 signatures
150 seconds
General
-
Target
JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe
-
Size
411KB
-
MD5
9d886f18c2863aff4baeff1e3026cca9
-
SHA1
0f78e196ddcaeb77f7543c59f60b4d6c7bbf93d6
-
SHA256
a24a419930ef537f7bca2a923d52ead23401a4748414bc9b51f59a1eaaeb24b0
-
SHA512
baf7174d2d5a08e55d5001cf1c29e675ffc06bf6099c9eaeba6bca0ae933234138d0a9798680f5646af81020b13908a82b981cc132d1c77f53e16a07fbba5693
-
SSDEEP
12288:c0BxMON1dil9eAtmndgusG/o2Gz9kZY/Ohtxn:HMON1diyn1w2ZY/Ur
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 588 wrote to memory of 2568 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 31 PID 588 wrote to memory of 2568 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 31 PID 588 wrote to memory of 2568 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 31 PID 588 wrote to memory of 2568 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 31 PID 588 wrote to memory of 2440 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 32 PID 588 wrote to memory of 2440 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 32 PID 588 wrote to memory of 2440 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 32 PID 588 wrote to memory of 2440 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 32 PID 588 wrote to memory of 2104 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 33 PID 588 wrote to memory of 2104 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 33 PID 588 wrote to memory of 2104 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 33 PID 588 wrote to memory of 2104 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 33 PID 588 wrote to memory of 2800 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 34 PID 588 wrote to memory of 2800 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 34 PID 588 wrote to memory of 2800 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 34 PID 588 wrote to memory of 2800 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 34 PID 588 wrote to memory of 2824 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 35 PID 588 wrote to memory of 2824 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 35 PID 588 wrote to memory of 2824 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 35 PID 588 wrote to memory of 2824 588 JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe"2⤵PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe"2⤵PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe"2⤵PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe"2⤵PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d886f18c2863aff4baeff1e3026cca9.exe"2⤵PID:2824
-