Analysis
-
max time kernel
144s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
71a8530e733ef8e81f5bb3ba8ccd5db5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
71a8530e733ef8e81f5bb3ba8ccd5db5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
71a8530e733ef8e81f5bb3ba8ccd5db5_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
71a8530e733ef8e81f5bb3ba8ccd5db5
-
SHA1
5b3168ea8b5284da86cbf514e1b2ccc88d172d1d
-
SHA256
292ebd63fb25fe8ce184cab323dddc255aefac815ffd39b72ba9edfdef4ac43b
-
SHA512
efc11cf60182ecc3b137480c23afabc7899fc919ab2cd444ccc98a234e10053fd6f6940c889574e9a6665033e305acd8747f788a75a69017ce322b80876cf7e6
-
SSDEEP
24576:h//kusyu3bb2Bw1UGFahCQPkP+TRF/FoL5JOnz5JxycUZoh3bW+rQ2YrWlOa3wfo:hELhbT1Da58iF/FoL/Oz5OcUSFvrQ2CV
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MyFileOn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\71a8530e733ef8e81f5bb3ba8ccd5db5_JaffaCakes118.exe" 71a8530e733ef8e81f5bb3ba8ccd5db5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71a8530e733ef8e81f5bb3ba8ccd5db5_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 71a8530e733ef8e81f5bb3ba8ccd5db5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3024 71a8530e733ef8e81f5bb3ba8ccd5db5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71a8530e733ef8e81f5bb3ba8ccd5db5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\71a8530e733ef8e81f5bb3ba8ccd5db5_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3024