Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 06:56
Static task
static1
Behavioral task
behavioral1
Sample
837267b2780f66f7f70710137f0c3be9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
837267b2780f66f7f70710137f0c3be9_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
837267b2780f66f7f70710137f0c3be9_JaffaCakes118.exe
-
Size
489KB
-
MD5
837267b2780f66f7f70710137f0c3be9
-
SHA1
d8475f3657697e4ff10d12bf66ab2baa30a4d266
-
SHA256
33a58e91aebb985a0daa68885af0fb4b0cd2dd5ae82cd6ba26acc139c3af932d
-
SHA512
257a6f5e6bd158bc47f5c8754bac30d67a932bd99ee69e82c18b9bc8b9f0afa065eb29455055114e365155f80cfb8c3a3186bc54ac2df554d494d70607fef122
-
SSDEEP
12288:iQbu1J8rByxTVDiJE6s51cRSyXla0VJQQk/:vCniyxTgJDMzy1a0VJQ
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\Drivers\etc\hosts 837267b2780f66f7f70710137f0c3be9_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\G2009B.log 837267b2780f66f7f70710137f0c3be9_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 837267b2780f66f7f70710137f0c3be9_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\837267b2780f66f7f70710137f0c3be9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\837267b2780f66f7f70710137f0c3be9_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2196