Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 04:19
Behavioral task
behavioral1
Sample
77065528f7803f7bc375c91384841998_JaffaCakes118.exe
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
77065528f7803f7bc375c91384841998_JaffaCakes118.exe
-
Size
78KB
-
MD5
77065528f7803f7bc375c91384841998
-
SHA1
237f27ff355bdef715262450164084630a56c348
-
SHA256
e449dadd2cc9e74c8e19560119d44e9bfadd619fb3d046255536a12ff369e80e
-
SHA512
f17e828c1b63bb6dd57fba6eb9b6c5eb4e60d2b3da36ddad1f3d1e87b4c3eafa3cdcf9fc4774b60a5d0343b7c408c14fa81b555bee71c743c7cf6a7488567936
-
SSDEEP
1536:aGnugd4CJVdSUkldkTCLt5/xltKMggleHsxiVVmpS0H21eCVdgrqO:aGucVdXklLt5/xltKMgglXoVs3EeE3
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77065528f7803f7bc375c91384841998_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2532 77065528f7803f7bc375c91384841998_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2336 2532 77065528f7803f7bc375c91384841998_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2336 2532 77065528f7803f7bc375c91384841998_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2336 2532 77065528f7803f7bc375c91384841998_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2336 2532 77065528f7803f7bc375c91384841998_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2336 2532 77065528f7803f7bc375c91384841998_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2336 2532 77065528f7803f7bc375c91384841998_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2336 2532 77065528f7803f7bc375c91384841998_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\77065528f7803f7bc375c91384841998_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77065528f7803f7bc375c91384841998_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- System Location Discovery: System Language Discovery
PID:2336
-