Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 18:05
Static task
static1
Behavioral task
behavioral1
Sample
8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe
-
Size
884KB
-
MD5
8b69dd9e0ff01e1bab67494dc2e2d4e0
-
SHA1
e557e00d07aa869a729c3e06fe810f9b83fe3189
-
SHA256
678c46567cdef1cc65f13d5e2b5cb26002209aa9b105b38b0ee883d3850edace
-
SHA512
87d50c24f9128ade76d7cb25e87853aac2ae2507dbeb8e1cf902257c62554dbefda3ba55900b493a7f1b916cdb1b889c801f92f081bde30380f7944527637c93
-
SSDEEP
24576:IM4xpxnP8jgxYI/D4JH4bYnD6UNSIa6gJc1/:Ihpxni8rw/SB6f/
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2148 set thread context of 2104 2148 8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2148 8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2104 2148 8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2104 2148 8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2104 2148 8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2104 2148 8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2104 2148 8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2104 2148 8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2104 2148 8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2104 2148 8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\8b69dd9e0ff01e1bab67494dc2e2d4e0_JaffaCakes118.exe2⤵PID:2104
-