Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 15:11
Static task
static1
Behavioral task
behavioral1
Sample
939d2b677261b171567685261e5b1f9a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
939d2b677261b171567685261e5b1f9a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
939d2b677261b171567685261e5b1f9a_JaffaCakes118.exe
-
Size
208KB
-
MD5
939d2b677261b171567685261e5b1f9a
-
SHA1
950015f456dacc46f06fb877020036f77fc74b1f
-
SHA256
9e5e909e0d5c1549747eee264a7d7a2aa573f21640c7ff6d3ae78b2867baed9f
-
SHA512
f9ae1883f8f7633e2652735aa0cd69e7540e55b249ae3312bbf5bf195cdbe24bc34dee2c02b0bd9c55b4b742bf1fee61dcf30a281d96316ba638212785166a55
-
SSDEEP
3072:869QzZfT8nm114UMzjL7oPpMj97VPcRevLtf7ZOOjNWNVrWlRlG9Naz:8IQVb8mXcjUBMj9aehf7FNgEcaz
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\7342221 939d2b677261b171567685261e5b1f9a_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\7186.tmp 939d2b677261b171567685261e5b1f9a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 939d2b677261b171567685261e5b1f9a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\939d2b677261b171567685261e5b1f9a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\939d2b677261b171567685261e5b1f9a_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4552