Analysis
-
max time kernel
136s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe
-
Size
364KB
-
MD5
6fd623e25634513e06608d638c76d3e2
-
SHA1
b1f32f0b9b8d01b3a4861d7d206f773247d348c2
-
SHA256
b81a3db848f541fad57ef4f8ed67725ac71251f1d648f9c890b237556601e738
-
SHA512
7579954069126725826e4dc0ace37780932342aebc361f0cc61e30e5a204668630bcdd11da18e65ee24094d3bf1068d7db9a191d598083d8938333456e048cca
-
SSDEEP
6144:ZBsbD+OSxP2wyzgSBuvTvk13OWXbWFP6xnYc6Czig+5L5jF2j6Zu2:ZEDMPeRG413Oy4P6VYbC2g+5Ln2+/
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 1736 1700 6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1700 6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe 1736 6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1736 1700 6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe 84 PID 1700 wrote to memory of 1736 1700 6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe 84 PID 1700 wrote to memory of 1736 1700 6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe 84 PID 1700 wrote to memory of 1736 1700 6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe 84 PID 1700 wrote to memory of 1736 1700 6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe 84 PID 1700 wrote to memory of 1736 1700 6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe 84 PID 1700 wrote to memory of 1736 1700 6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe 84 PID 1700 wrote to memory of 1736 1700 6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6fd623e25634513e06608d638c76d3e2_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1736
-