Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
87fcea711784d3ebce4eacbce77b35da_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
87fcea711784d3ebce4eacbce77b35da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
87fcea711784d3ebce4eacbce77b35da_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
87fcea711784d3ebce4eacbce77b35da
-
SHA1
eb02347218bfaad27aaa1c40b0e0bba4b90e1148
-
SHA256
271a4b4bc2e37b8e963f4217fee9321c5a3df29c22ebc03729740a73f92c7f1e
-
SHA512
ee50b8f284473e1b821b56066445aabd2f8395ca978bca22561c75b893029d0996f64015158c3ef0a241aa1ed4e92f487735daec95afc340047207d486257a5c
-
SSDEEP
49152:NW7812Fi1T8ZhhY3H2xcVh/QGWnUv5re4TpjJdwL1t2s28:NZEFiUKH2+HoG2Uvdrh0L1Is28
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\ = "C:\\Windows\\System32\\win_update.exe" 87fcea711784d3ebce4eacbce77b35da_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\win_update.exe 87fcea711784d3ebce4eacbce77b35da_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\win_update.exe 87fcea711784d3ebce4eacbce77b35da_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87fcea711784d3ebce4eacbce77b35da_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\.SCSI0: 87fcea711784d3ebce4eacbce77b35da_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2380 87fcea711784d3ebce4eacbce77b35da_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87fcea711784d3ebce4eacbce77b35da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\87fcea711784d3ebce4eacbce77b35da_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: GetForegroundWindowSpam
PID:2380