Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 22:51
Behavioral task
behavioral1
Sample
820ba8acf64b2ca99246538d0ee1dda8_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
820ba8acf64b2ca99246538d0ee1dda8_JaffaCakes118.exe
-
Size
370KB
-
MD5
820ba8acf64b2ca99246538d0ee1dda8
-
SHA1
628d2b3b5fa7ad9481364fcf41c20bb2c8f94787
-
SHA256
c6b3d4cedbc881e28ae0ee89b2818a5f1bd616604c69389910192cfab8d23c6a
-
SHA512
430fda8e20e63a375a5edf998defb13efcd6dee41fd4ae0b535a2172fc731ca6443c5061e386df0455151699b877a0cd2a0729a33570697ae55e05c8c35855e0
-
SSDEEP
6144:cBgh/58KGip9lmh0UwwDdxtPw13OyhFR8uHSpchaX4cikvwxFALk4Jukh5n6z:cBMmKGnhDT+JlCLpaauki25uQy
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1532-0-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1532-1-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1532-1-0x0000000000400000-0x00000000004B7000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 820ba8acf64b2ca99246538d0ee1dda8_JaffaCakes118.exe