Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
78e9fd1cafdf7f55a666485b65f16064_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
78e9fd1cafdf7f55a666485b65f16064_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
78e9fd1cafdf7f55a666485b65f16064_JaffaCakes118.exe
-
Size
108KB
-
MD5
78e9fd1cafdf7f55a666485b65f16064
-
SHA1
6e70d5a1ac46c65e20d8c5debeb2fb6dc0baeaf9
-
SHA256
c30110aff096155d3542ece67278cdf7da2d7c50b9f496a8f079e2b8c91ec9a6
-
SHA512
11c0132c675f2919b52f4284f5a85419fe8c3041c80be56c1759e905a734795061779d1bfc23a9361d91400910ddd6ec952a7ef7f7ee12dd2fcc5a759f8cd8c5
-
SSDEEP
1536:kmudcEvCkMaYeqE/DYnFvNvkuc5YaL7XtIHz5Wb4EKhSMowHaly2nE+elVzkvH1+:kmUfxMafqE/DYn/kyFhn
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts 78e9fd1cafdf7f55a666485b65f16064_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78e9fd1cafdf7f55a666485b65f16064_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4180 78e9fd1cafdf7f55a666485b65f16064_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78e9fd1cafdf7f55a666485b65f16064_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\78e9fd1cafdf7f55a666485b65f16064_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4180