Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe
-
Size
820KB
-
MD5
96ec20fbad2c047a0254d05cc20d5054
-
SHA1
436bb55ace751a098159fccae55df2ea6c890855
-
SHA256
5c47fd660c3d4d6334705062cbb2067708e8f03113bc687d905b67c927e103a7
-
SHA512
9eb5088e6ee7099693fb4ee3a131cd977e67ab39e6af02a324944b4afd7a8ad90ddda16a3a15fb70852f0bfebd35c526ecd6bceba791575244b47e4ec7c7255b
-
SSDEEP
12288:sPNqH1OXnnWf1o3OkcRC8O5sD1AdFGagYEkQ0e9e:s1qH1OXmoejRCjsDoFGahNe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\klafile\shell\open 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\klafile\ = "kla" 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\klafile\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\96EC20~1.EXE,1" 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\klafile\shell\open\command 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\klafile\shell 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\klafile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\96EC20~1.EXE \"%1\"" 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\klafile\shell\print\command 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\klafile\shell\print 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\klafile\shell\print\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\96EC20~1.EXE /p \"%1\"" 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\klafile 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\klafile\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\96EC20~1.EXE /pt \"%1\" \"%2\" \"%3\" \"%4\"" 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.kla\ = "klafile" 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\klafile\DefaultIcon 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\klafile\shell\printto 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.kla 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.kla\ShellNew 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.kla\ShellNew\NullFile 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\klafile\shell\printto\command 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1928 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe 1928 96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96ec20fbad2c047a0254d05cc20d5054_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1928