Analysis
-
max time kernel
0s -
max time network
6s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe
-
Size
79KB
-
MD5
988d4966261c4d39362f1899f6fef60b
-
SHA1
15d58114cafdbb61a497c3376147a27b24cab421
-
SHA256
1bb256f77d8748b6171c5982bc85ca775216a20be3b16fe2c6cd90c0772844d6
-
SHA512
bd6c7221b988c5538a4bd398a13ad781aa9bcd16eaecd3b649e7ef70d78b63080183b9c300827813099c153a7088eb37f682264b80595c9e446fa4a6b86b6715
-
SSDEEP
1536:E/Io+qR1eyoZ3418gAcwkt7VzBlE7rMOEEPKBk9G5xhEY4tflYF:E/9NgyY4KgNO7rMAPikuYIF
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\test JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Files and Directories 1 TTPs 2 IoCs
pid Process 1948 reg.exe 3008 cmd.exe -
resource yara_rule behavioral1/memory/1724-2-0x0000000000400000-0x000000000042B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 1724 JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe Token: SeTcbPrivilege 1724 JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe Token: SeChangeNotifyPrivilege 1724 JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe Token: SeCreateTokenPrivilege 1724 JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe Token: SeBackupPrivilege 1724 JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe Token: SeRestorePrivilege 1724 JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe Token: SeIncreaseQuotaPrivilege 1724 JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe Token: SeAssignPrimaryTokenPrivilege 1724 JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_988d4966261c4d39362f1899f6fef60b.exe"1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy %WINDIR%\system32\drivers\etc\hosts %WINDIR%\system32\drivers\etc\hosts.sam /Y && at 10:39:00 cmd.exe /c copy %TEMP%\259441893FdOh %WINDIR%\system32\drivers\etc\hosts /Y2⤵PID:2992
-
C:\Windows\SysWOW64\at.exeat 10:39:00 cmd.exe /c copy C:\Users\Admin\AppData\Local\Temp\259441893FdOh C:\Windows\system32\drivers\etc\hosts /Y3⤵PID:1964
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\windows\CurrentVersion\Run /v 259441924 /t REG_SZ /d "cmd.exe /c copy %TEMP%\259441893FdOh %WINDIR%\system32\drivers\etc\hosts /Y && attrib +H %WINDIR%\system32\drivers\etc\hosts /f2⤵
- Hide Artifacts: Hidden Files and Directories
PID:3008 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\windows\CurrentVersion\Run /v 259441924 /t REG_SZ /d "cmd.exe /c copy C:\Users\Admin\AppData\Local\Temp\259441893FdOh C:\Windows\system32\drivers\etc\hosts /Y && attrib +H C:\Windows\system32\drivers\etc\hosts /f3⤵
- Hide Artifacts: Hidden Files and Directories
PID:1948
-
-