Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 06:42
Behavioral task
behavioral1
Sample
72f8df65c82345952dc52965ab6e124c_JaffaCakes118.exe
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
72f8df65c82345952dc52965ab6e124c_JaffaCakes118.exe
-
Size
99KB
-
MD5
72f8df65c82345952dc52965ab6e124c
-
SHA1
be8144e69ef63a4756a97382d10ffff64a0bd8d9
-
SHA256
fd9590c07fa7892d3f79678c7090296eeb161bddeb4172a6eaf14818f8220f9f
-
SHA512
106a2a7ceb8a28ce62af13a3572c1a75dd861d00bd5876ef2d7cbf96b9b3cd06d5ac85e694df4b90d138bbc48fcc4171a434dd0b27f3a76c5f6f59e782a655c8
-
SSDEEP
1536:fZnheFBegdV5uFap2p00LUzSZGD15kliLwAmDkCUdILTfAbUex1dyKsjytMkD1z+:RheVV5XpURSl0PmILTfKrJyKyYFzQso
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72f8df65c82345952dc52965ab6e124c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2348 72f8df65c82345952dc52965ab6e124c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1904 2348 72f8df65c82345952dc52965ab6e124c_JaffaCakes118.exe 31 PID 2348 wrote to memory of 1904 2348 72f8df65c82345952dc52965ab6e124c_JaffaCakes118.exe 31 PID 2348 wrote to memory of 1904 2348 72f8df65c82345952dc52965ab6e124c_JaffaCakes118.exe 31 PID 2348 wrote to memory of 1904 2348 72f8df65c82345952dc52965ab6e124c_JaffaCakes118.exe 31 PID 2348 wrote to memory of 1904 2348 72f8df65c82345952dc52965ab6e124c_JaffaCakes118.exe 31 PID 2348 wrote to memory of 1904 2348 72f8df65c82345952dc52965ab6e124c_JaffaCakes118.exe 31 PID 2348 wrote to memory of 1904 2348 72f8df65c82345952dc52965ab6e124c_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\72f8df65c82345952dc52965ab6e124c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\72f8df65c82345952dc52965ab6e124c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- System Location Discovery: System Language Discovery
PID:1904
-