Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
75c9fb47c05e9e8ff18d296963ddb564_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75c9fb47c05e9e8ff18d296963ddb564_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
75c9fb47c05e9e8ff18d296963ddb564_JaffaCakes118.exe
-
Size
202KB
-
MD5
75c9fb47c05e9e8ff18d296963ddb564
-
SHA1
a5c8b01d864cf69aaf936ff9221a564eb5210f5b
-
SHA256
74736570b0be6a4ebc04b140c059f234613c9b25b8b9f2d79bf5add0a17eec6b
-
SHA512
89709cefe02561b2e391022a1bb6b9d1c1ecc81db9992954d8f2278349fe90af1b0a5193477316181e713e391cf49528874be82929f843b6b03ce572a6f77124
-
SSDEEP
3072:s7qgy1gT9cTvxxKVucV77Dzz/asNarrVxlK4Lo7cjny0q2HFl7i:s7qgy10nHusErrVxljvdF0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75c9fb47c05e9e8ff18d296963ddb564_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2160 75c9fb47c05e9e8ff18d296963ddb564_JaffaCakes118.exe 2160 75c9fb47c05e9e8ff18d296963ddb564_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2836 2160 75c9fb47c05e9e8ff18d296963ddb564_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2836 2160 75c9fb47c05e9e8ff18d296963ddb564_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2836 2160 75c9fb47c05e9e8ff18d296963ddb564_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2836 2160 75c9fb47c05e9e8ff18d296963ddb564_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\75c9fb47c05e9e8ff18d296963ddb564_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\75c9fb47c05e9e8ff18d296963ddb564_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\75c9fb47c05e9e8ff18d296963ddb564_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\75c9fb47c05e9e8ff18d296963ddb564_JaffaCakes118.exe2⤵PID:2836
-