Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 16:43
Behavioral task
behavioral1
Sample
74e006106449f76ec42f5f33cabe8467_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
74e006106449f76ec42f5f33cabe8467_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
74e006106449f76ec42f5f33cabe8467
-
SHA1
7951aba32240b5d1158140448228660f8151218c
-
SHA256
25224b6c50baacec829bc9c28fbe7e80930857b536d0c8d3bd93a585e60bc0c1
-
SHA512
97db5a02de1d28bdccbc9ef9bb2764121b42b548b85d825b6c4e16e6944c479b8f109b80f75a654552088d7ab23162fc12f82b960ebdc1175b10f0868a739af5
-
SSDEEP
49152:PvpvqWOS0B7uN2UeqzSqujdRfzAIxve4DVdyDI64nw3Vx3PPGEg7zS2LO:PhvqWOS0B7uNeqzSqujDfzAIxW4jyDIm
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2368-0-0x0000000000400000-0x0000000000583000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74e006106449f76ec42f5f33cabe8467_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2368 74e006106449f76ec42f5f33cabe8467_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2368 74e006106449f76ec42f5f33cabe8467_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74e006106449f76ec42f5f33cabe8467_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74e006106449f76ec42f5f33cabe8467_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2368