Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
77f65ce047fcf71ce68894c0dddefa46_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
77f65ce047fcf71ce68894c0dddefa46_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
77f65ce047fcf71ce68894c0dddefa46_JaffaCakes118.exe
-
Size
124KB
-
MD5
77f65ce047fcf71ce68894c0dddefa46
-
SHA1
fa54d2188a43cce8052049fea974e5205544b76d
-
SHA256
2d117067db4aba7aa2366e871d91e4474e80b89647d5b13578d25f2bffcbf19a
-
SHA512
a90499e7db201373f9a9907c320776c014ef5fcde56694212560d29e45a50281c09aa63685ef8a9902db8bbaa44278ed2c9333339f07c0af9357892597515407
-
SSDEEP
3072:IkHh5/Mv15woWup9NTTYIyHRQE9VMNh8kY2KvF:nXwWMuRQE
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 77f65ce047fcf71ce68894c0dddefa46_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 77f65ce047fcf71ce68894c0dddefa46_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77f65ce047fcf71ce68894c0dddefa46_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1420 77f65ce047fcf71ce68894c0dddefa46_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77f65ce047fcf71ce68894c0dddefa46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77f65ce047fcf71ce68894c0dddefa46_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1420