Analysis
-
max time kernel
135s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 09:37
Static task
static1
Behavioral task
behavioral1
Sample
738065136a509193ebe957e5f66b3600_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
738065136a509193ebe957e5f66b3600_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
738065136a509193ebe957e5f66b3600_JaffaCakes118.exe
-
Size
476KB
-
MD5
738065136a509193ebe957e5f66b3600
-
SHA1
d864d76ce63eb33b6a88b5bd941d709d99c9b05f
-
SHA256
2d3202278a3482f1a0a3b04afd063d6777f5ef91fc7f504676896aab99504bfa
-
SHA512
356abce7763c73c36125dcb4c7d181ec6b3a5e653ccdabf1dad09b3c34bd191828c7a8f578f0c586b437f1da7628d0f028eec52a9af1513e638428ac2b841d08
-
SSDEEP
6144:bJZv5zFiIOuoUsquTFWF7ySG1KnuJbw5mo2hHk6b1LC7t/jIp:1LFmKvt/O
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4356 set thread context of 3140 4356 738065136a509193ebe957e5f66b3600_JaffaCakes118.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 738065136a509193ebe957e5f66b3600_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4356 wrote to memory of 3140 4356 738065136a509193ebe957e5f66b3600_JaffaCakes118.exe 84 PID 4356 wrote to memory of 3140 4356 738065136a509193ebe957e5f66b3600_JaffaCakes118.exe 84 PID 4356 wrote to memory of 3140 4356 738065136a509193ebe957e5f66b3600_JaffaCakes118.exe 84 PID 4356 wrote to memory of 3140 4356 738065136a509193ebe957e5f66b3600_JaffaCakes118.exe 84 PID 4356 wrote to memory of 3140 4356 738065136a509193ebe957e5f66b3600_JaffaCakes118.exe 84 PID 4356 wrote to memory of 3140 4356 738065136a509193ebe957e5f66b3600_JaffaCakes118.exe 84 PID 4356 wrote to memory of 3140 4356 738065136a509193ebe957e5f66b3600_JaffaCakes118.exe 84 PID 4356 wrote to memory of 3140 4356 738065136a509193ebe957e5f66b3600_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\738065136a509193ebe957e5f66b3600_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\738065136a509193ebe957e5f66b3600_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\738065136a509193ebe957e5f66b3600_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\738065136a509193ebe957e5f66b3600_JaffaCakes118.exe"2⤵PID:3140
-