Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
723850e040184e7aa3b956823e8d0500_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
723850e040184e7aa3b956823e8d0500_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
723850e040184e7aa3b956823e8d0500_JaffaCakes118.exe
-
Size
16KB
-
MD5
723850e040184e7aa3b956823e8d0500
-
SHA1
18768ee30e8231b0e2a20da4b547af9dfc83d137
-
SHA256
8d48f64f887114f6f46dca64aab562b8f7c2a26422fd06491cc6f412b7f85329
-
SHA512
f6337024c82d3ff6ca3dcb566b3ea10489e0f19e9c4cecb65ca86b5b8a3f101cf846028aa48dbdd5d8919e6d7dd81f71c0c0f5fbc46bbe5871bcb7ccdaad0c3e
-
SSDEEP
48:akPfkmZAvzcNbiiAllp5mbEGE1HP4oyl12X:t+vmAllp5mbm9P4oyn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723850e040184e7aa3b956823e8d0500_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 928 wrote to memory of 3636 928 723850e040184e7aa3b956823e8d0500_JaffaCakes118.exe 85 PID 928 wrote to memory of 3636 928 723850e040184e7aa3b956823e8d0500_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\723850e040184e7aa3b956823e8d0500_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\723850e040184e7aa3b956823e8d0500_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:928 -
\??\c:\windows\notepad.exec:\\windows\\notepad.exe2⤵PID:3636
-