Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 14:03
Behavioral task
behavioral1
Sample
86575c018998b7ab9e85a612d2c7a3e5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
86575c018998b7ab9e85a612d2c7a3e5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86575c018998b7ab9e85a612d2c7a3e5_JaffaCakes118.exe
-
Size
195KB
-
MD5
86575c018998b7ab9e85a612d2c7a3e5
-
SHA1
c2bf1d8069a651e0919dfe6b752e8eda59c3d310
-
SHA256
8edc347373ff1eb3b8707d9008792b59eb6bce37cee467e9c0d1a74b0d810f99
-
SHA512
787ff002539984358898b8ed80e12cd9a76afcbcd10e55ff3ff93681e654c737bd7bab1cfe7a0a9588d0e3909aa65d30e914730f99cad7fc54abcf221bb0bd87
-
SSDEEP
3072:BC2z2kc4lI1XbJBohHtFm4tnLXJRkKF16ZLiz075JAW4lNQwwDHA:BrNc4mLJGdmGn/7n/kJAW4lqZA
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2632-0-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2632-2-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2632-5-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2632-9-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2632-13-0x0000000000400000-0x000000000048A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Live Messenger = "C:\\Windows\\system32\\msnmsgr.exe" 86575c018998b7ab9e85a612d2c7a3e5_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\logsystemlogsystem 86575c018998b7ab9e85a612d2c7a3e5_JaffaCakes118.exe File created C:\Windows\SysWOW64\temptemp 86575c018998b7ab9e85a612d2c7a3e5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86575c018998b7ab9e85a612d2c7a3e5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86575c018998b7ab9e85a612d2c7a3e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\86575c018998b7ab9e85a612d2c7a3e5_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2632