Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 16:34
Static task
static1
Behavioral task
behavioral1
Sample
78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe
-
Size
92KB
-
MD5
78cd144693f600b5bc3f4be96d9d6b2a
-
SHA1
d4e0177643c0fd33babbdec59f806d41f17adc73
-
SHA256
ee22dd9d4a710db4ea0baf4fe54bad12dce1c2cdf6309649214b45680a166493
-
SHA512
c375fd591b4556cd31402097919af22f1acf073b4434b980db7c107a8b8de3a3adc5ac21fa0216db29edb03dc94c0dc22a7cd62f0bdb0b3a6491bce484fc742f
-
SSDEEP
1536:b6QNO/kkpCfkT/7lg8LsvtjDbfYdDSCJgN6cn8BdJvUJtvY6N/S/2Mb:r4skpCfO/7lZL6jDwDsIPxkpYg/S/3b
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2336 set thread context of 2348 2336 78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2336 78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe 2348 78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2348 2336 78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2348 2336 78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2348 2336 78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2348 2336 78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2348 2336 78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2348 2336 78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2348 2336 78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2348 2336 78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2348 2336 78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\78cd144693f600b5bc3f4be96d9d6b2a_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2348
-