Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe
-
Size
187KB
-
MD5
68dc22485dd48a52416855d577e8de12
-
SHA1
563a65273b32e30524c22ab60e0bfa3b44bdca9c
-
SHA256
e13a26b357dc7a8ab49b68754c91e61f217786bef011d6bc18812619bda2171c
-
SHA512
27f7e705fdeba53b52e11824c9c3281347abf472f9ec837ae6a4c5a5f4f9dcf61e9ff0c3f4c8312c055f90d83a0b4e68ca1283b5e14fdfd6a0926c92e10636ea
-
SSDEEP
3072:Xdd1ceXZZv3a2/03JW9CVwpJDiORLmhRJpSMwtlAnyKDAnA2JP6MLcYQ/+TLI9B:P2eXHS2M3s9s2DizoMTAA2cM4A+
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1864 set thread context of 1672 1864 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1672 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe 1672 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1864 wrote to memory of 1672 1864 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe 30 PID 1864 wrote to memory of 1672 1864 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe 30 PID 1864 wrote to memory of 1672 1864 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe 30 PID 1864 wrote to memory of 1672 1864 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe 30 PID 1864 wrote to memory of 1672 1864 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe 30 PID 1864 wrote to memory of 1672 1864 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe 30 PID 1672 wrote to memory of 1212 1672 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe 21 PID 1672 wrote to memory of 1212 1672 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe 21 PID 1672 wrote to memory of 1212 1672 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe 21 PID 1672 wrote to memory of 1212 1672 68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68dc22485dd48a52416855d577e8de12_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1672
-
-