Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 18:48
Static task
static1
Behavioral task
behavioral1
Sample
75468fb282e91596a98f634dad1ffcb1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75468fb282e91596a98f634dad1ffcb1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
75468fb282e91596a98f634dad1ffcb1_JaffaCakes118.exe
-
Size
111KB
-
MD5
75468fb282e91596a98f634dad1ffcb1
-
SHA1
a377464a5bba7c82d17748dd5d0bf29ed5fe2fdf
-
SHA256
65d47bbe4c62f98f0770f9744d969a010162173b15e3d392a4ef96d6a04ee17d
-
SHA512
0b2ccc89e9b1c12b8416fe4ee5c1b40cb82e728a9968a623ecae8b7800465dd52d3788ea706eed6d9b8cd36464e0f1c843dc97200a1841761845e1c0a146ed29
-
SSDEEP
1536:qniLJYlZMWKz+3/Cs2nLcTBBFAcE+zqWu+fuoJNAJGeNuJ+:1q/MWOsyLcTBBFAcHuwlNesJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75468fb282e91596a98f634dad1ffcb1_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2384 75468fb282e91596a98f634dad1ffcb1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1064 2384 75468fb282e91596a98f634dad1ffcb1_JaffaCakes118.exe 18 PID 2384 wrote to memory of 1064 2384 75468fb282e91596a98f634dad1ffcb1_JaffaCakes118.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\75468fb282e91596a98f634dad1ffcb1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\75468fb282e91596a98f634dad1ffcb1_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2384
-