Analysis
-
max time kernel
135s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
768e5607b61453133f0c7bc55b6e084c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
768e5607b61453133f0c7bc55b6e084c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
768e5607b61453133f0c7bc55b6e084c_JaffaCakes118.exe
-
Size
390KB
-
MD5
768e5607b61453133f0c7bc55b6e084c
-
SHA1
5dbf51d726aae66340d8a3e349e524f9be83ae13
-
SHA256
6a5603872c61a23fcc979334ff720acf2a527b078101ae48b7d0ec4f08d6cb34
-
SHA512
21c3cfd18dc335d7ab0f058fae7e609b023d104954e5b30d56135a47d83ecd021cf82ed704a2e882eee52863d48ea8f6fd3c9922af9a381b76af44576fd8ac9b
-
SSDEEP
6144:uMja5iGIAxm/ydTnFUdb+2zW/uAci+eXIkKD/RVbEqskoMiNHHf9ynCIdOlSU:u0awBydTF6Kl/uAcihIj9pEqsz9yNlU
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lollmt = "\"c:\\users\\admin\\appdata\\local\\temp\\768e5607b61453133f0c7bc55b6e084c_jaffacakes118.exe\"" 768e5607b61453133f0c7bc55b6e084c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 768e5607b61453133f0c7bc55b6e084c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1276 768e5607b61453133f0c7bc55b6e084c_JaffaCakes118.exe 1276 768e5607b61453133f0c7bc55b6e084c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\768e5607b61453133f0c7bc55b6e084c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\768e5607b61453133f0c7bc55b6e084c_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1276