Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 08:42
Static task
static1
Behavioral task
behavioral1
Sample
a1e21b9e5b2972391e0dc0b028a9ddd1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a1e21b9e5b2972391e0dc0b028a9ddd1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a1e21b9e5b2972391e0dc0b028a9ddd1_JaffaCakes118.exe
-
Size
579KB
-
MD5
a1e21b9e5b2972391e0dc0b028a9ddd1
-
SHA1
e0e0d6efd3ddcdc8faba3681657798c4a4f71765
-
SHA256
5fbfe417d7ea8842368ae3fe362034373b87c422a379d9873d23cfd905081a53
-
SHA512
931fbc57673c790ec1d23ea271f7641d761d2620584fcded32ccff6141b80022a030309bc152754a4afcf96e183e10f6c16ed971370dda668f1aacb81df66d1d
-
SSDEEP
12288:td3zDa8Kw/+Go6mJ/5Phr/MzOZmkGesexISRX9MYO9aL0yWkHz3XPsQJ:tVzD/Kw2Go6IFpGesex1B9Mz91yWkb1
Malware Config
Signatures
-
AutoIT Executable 26 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1008-4-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-6-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-5-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-7-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-9-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-8-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-11-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-10-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-12-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-14-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-15-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-16-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-17-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-18-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-19-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-20-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-21-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-22-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-23-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-24-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-25-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-26-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-27-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-28-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-29-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/1008-30-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1e21b9e5b2972391e0dc0b028a9ddd1_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1008 a1e21b9e5b2972391e0dc0b028a9ddd1_JaffaCakes118.exe