Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 23:19
Behavioral task
behavioral1
Sample
83f2b98258a211bbd3e92d2951c02d72_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
83f2b98258a211bbd3e92d2951c02d72_JaffaCakes118.exe
-
Size
358KB
-
MD5
83f2b98258a211bbd3e92d2951c02d72
-
SHA1
17e8a5c9e8404605f553d692626de5623d02c37e
-
SHA256
b337c62b967fb07ecaaf0f6df698bcf50c581470e9520a118b985534dfff53bf
-
SHA512
87075e89bd4cd0076abe687c60c7b99d3c8ca711d3e60c6992b15e08eb24b540509babb71c2460eec7a335f0384202a80e664572754ea74642b77c5ca7228ca7
-
SSDEEP
6144:ql8KWs/bWq+nR6xtEstSlckJ4OUSccLU4968TI+RjoS0+:ql837cCHJrccvZPRjoS0+
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2312-0-0x0000000000400000-0x000000000050C000-memory.dmp upx behavioral2/memory/2312-12-0x0000000000400000-0x000000000050C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83f2b98258a211bbd3e92d2951c02d72_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2312 83f2b98258a211bbd3e92d2951c02d72_JaffaCakes118.exe 2312 83f2b98258a211bbd3e92d2951c02d72_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56e241d7f1916f84a6c9b277cb418572f
SHA1761dcbe90b5bcb0f70ed23a4766140348d66a60a
SHA25684d29da26f3eb6e691721b31da23db5431084fb0df33ada0d38dd0e890468195
SHA5127a5f399abe04274431ae60e79087e2feda8cbd3141ce8329ad98be0d3183508ec161524919b43bbffa3711cb97bf7f8823438530516b322ba7ad3b7a108a2b8c