Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 05:48
Behavioral task
behavioral1
Sample
JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe
-
Size
286KB
-
MD5
b6c8ef48cb7896740ff400e8924ead22
-
SHA1
e462eec5fe1378a61539f081f29b7e2198bc59b6
-
SHA256
a7df7a64ece2ecdfda809f299468a6f61a74aec1c15cebf7d51eb5fe68b2396d
-
SHA512
a5e3882d346b4b8585da4f56280b24a72e0b4e6a0a93a34793d45be4cf81ca14730063dbf7c3fd5ba468e34c1f0d1a63aaf67040ffefd852201f01d7d7de3a7e
-
SSDEEP
3072:Lyijen+2UjU1NiqZ0y3ImHneKCg9fr/0naQmQS8trnd+2eqAbow:OYu+2UjEity33eKCg6nFmGdNAB
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe" JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3108 JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe Token: SeIncBasePriorityPrivilege 3108 JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3108 JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3108 JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3108 JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 424 wrote to memory of 2404 424 cmd.exe 91 PID 424 wrote to memory of 2404 424 cmd.exe 91 PID 424 wrote to memory of 2404 424 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3108
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe1⤵
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b6c8ef48cb7896740ff400e8924ead22.exe2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2404
-