Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 02:42
Behavioral task
behavioral1
Sample
76c2cfc7035c5e07c4f85230d9f459fc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
76c2cfc7035c5e07c4f85230d9f459fc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
76c2cfc7035c5e07c4f85230d9f459fc_JaffaCakes118.exe
-
Size
53KB
-
MD5
76c2cfc7035c5e07c4f85230d9f459fc
-
SHA1
8042f4893a0ad65684d887635a000b91904c7545
-
SHA256
82d64a97a9c16bce8cfc09d1599cd36ea69d90b4c99b1c649d5d00f6f59a8bd9
-
SHA512
5eeb3ee93d7d318cab4fc60a5a8c761a1c7b0a4c07621e3942faf8314f22c623b4ada6c11c2f2f1bb132534864f26bae7732ba86de51fa057b68acc51c3a6c81
-
SSDEEP
1536:6TeG8VzKlMwcgNtzF5rQRw5eOnGKXm0EciSmJ:/SMwntWwdGY9EcZS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1488-0-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1488-2-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1488-3-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1488-4-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1488-5-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1488-6-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1488-7-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1488-8-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1488-9-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1488-10-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1488-11-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1488-12-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1488-13-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1488-14-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1488-15-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NI = "\"C:\\Program Files (x86)\\installer\\si.exe\"" 76c2cfc7035c5e07c4f85230d9f459fc_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\installer\si.exe 76c2cfc7035c5e07c4f85230d9f459fc_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\installer\si.exe 76c2cfc7035c5e07c4f85230d9f459fc_JaffaCakes118.exe File created C:\Program Files (x86)\installer\.lock 76c2cfc7035c5e07c4f85230d9f459fc_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76c2cfc7035c5e07c4f85230d9f459fc_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1488 76c2cfc7035c5e07c4f85230d9f459fc_JaffaCakes118.exe 1488 76c2cfc7035c5e07c4f85230d9f459fc_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76c2cfc7035c5e07c4f85230d9f459fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\76c2cfc7035c5e07c4f85230d9f459fc_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1488