Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe
-
Size
181KB
-
MD5
7364023aacb8101d49cb15e617ca6c0d
-
SHA1
6580a5fdba298379700da8d9a10c2b68a9634870
-
SHA256
0a8777bb55d4c5aa88182e18e5889ea7dab318318bce1a2778bf1c3a40b7d41c
-
SHA512
17ce887dd2ade98266793490b6571e31b65f093d3ae7b253b39b794562634f2375d1d6494255733c30b040b349690f2f5ed1c9552c508ac3d885ad7c060a4467
-
SSDEEP
3072:n+HYZRoqnCx4fe9VEubuNTwR92vzz8HvYE/U/ZaIw3y30bUEC6WPix6G:n2LxSeDEubSEH2cAE/UsC30bUwWa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1756 set thread context of 2540 1756 7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1756 7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2540 1756 7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe 30 PID 1756 wrote to memory of 2540 1756 7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe 30 PID 1756 wrote to memory of 2540 1756 7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe 30 PID 1756 wrote to memory of 2540 1756 7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe 30 PID 1756 wrote to memory of 2540 1756 7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe 30 PID 1756 wrote to memory of 2540 1756 7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe 30 PID 1756 wrote to memory of 2540 1756 7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe 30 PID 1756 wrote to memory of 2540 1756 7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\7364023aacb8101d49cb15e617ca6c0d_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53447ad9c77a2c39b347c93cdd1a8c7a5
SHA17bb89d908056bdb9fb1d0acc5c96ee5da4ffe59d
SHA256aea99fd409296db924beb1b990e5948d1d8700e3097845221e343b0f4ae55bad
SHA512c4dc5cdefc5e6f5aa775ef394e98170f5a2bc830665e41ed1eebb212fecadbc5aabb1d4a512ea697424dd401718a125b7d5d108bcba160b1a4f99b91cd1b1f21