Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 04:05
Static task
static1
Behavioral task
behavioral1
Sample
a551302840d37f607b3b92cf0623445f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a551302840d37f607b3b92cf0623445f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a551302840d37f607b3b92cf0623445f_JaffaCakes118.exe
-
Size
320KB
-
MD5
a551302840d37f607b3b92cf0623445f
-
SHA1
510bab5e97a1d152d606e146b6b322ec2bb9aca6
-
SHA256
1944682778ef09288679e6ea8fd524fa0431a8e79885479b34e9be765a7e6785
-
SHA512
59c8b740dd38d81675205faf01be2ace9f1dcfafce5e8d2a4abd58ae59dbc9c457415be37e90c73f415ddce1f5ed8fd355f44e4f50dbe38cb3c8ba2d4b670dd1
-
SSDEEP
6144:rqr+TK+FUJ9M/Yu4FmrTMaQwCBKrJ/zhwPVj9YPwnv/3Onzc:rg+3hgu4kXMaIiJ/Vwdj2KvfOzc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\Arquivos de programas\\djfYuUP5.exe" a551302840d37f607b3b92cf0623445f_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\OptionalComponents\MSFS a551302840d37f607b3b92cf0623445f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\OptionalComponents\MAPI a551302840d37f607b3b92cf0623445f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\OptionalComponents\IMAIL a551302840d37f607b3b92cf0623445f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\OptionalComponents a551302840d37f607b3b92cf0623445f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN a551302840d37f607b3b92cf0623445f_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created \??\c:\windows\winlogn.ini a551302840d37f607b3b92cf0623445f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a551302840d37f607b3b92cf0623445f_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2200 a551302840d37f607b3b92cf0623445f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a551302840d37f607b3b92cf0623445f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a551302840d37f607b3b92cf0623445f_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2200