Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
960d01fc8d210aaf6ef6dbec0eddc063_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
960d01fc8d210aaf6ef6dbec0eddc063_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
960d01fc8d210aaf6ef6dbec0eddc063_JaffaCakes118.exe
-
Size
36KB
-
MD5
960d01fc8d210aaf6ef6dbec0eddc063
-
SHA1
4b353ddae31b0dde8acb1ac46bc0d934d6a9f916
-
SHA256
c9a74b8e22558c6a59c3aab302f5c97a185993ed538d5ba4ad7638d04f432d38
-
SHA512
a3d9dbbfb8888748f06ca90b01e84ffdc70dd7c53e003532811e78dbafabb3be6af64ecf52563915bbacadcd555ae5a20d37f57f461bd68ae9b713d55b59c6e7
-
SSDEEP
384:gU3dRe2RaddcQYTarHsE1/v7/s4c+lQtmJUieD84oXQn:gUNReUKcy1wbC7Uld/
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 960d01fc8d210aaf6ef6dbec0eddc063_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 960d01fc8d210aaf6ef6dbec0eddc063_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 960d01fc8d210aaf6ef6dbec0eddc063_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2792 960d01fc8d210aaf6ef6dbec0eddc063_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\960d01fc8d210aaf6ef6dbec0eddc063_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\960d01fc8d210aaf6ef6dbec0eddc063_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2792