Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 10:09
Static task
static1
Behavioral task
behavioral1
Sample
a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe
-
Size
84KB
-
MD5
a65ed848316cda8499381dd084a0c3e8
-
SHA1
29fe82239e06fd7c6da059b9e312b310e44a3335
-
SHA256
829b8503c02916feaaa13d6ad34872974958aeec3a74457380ead0db160b79bd
-
SHA512
21afaf5923c1b41ae9a720e8d0b7c065c6403da85ff7c9a0c16a0788f0907e90e85187853527be88605b4cc2af0c1038ce7e0581622e5ea4a038e2a6c235b2a6
-
SSDEEP
1536:XKREnclXB7sV3VeEQpUIxGQ+t89amRKhcFRboXkJl/bd5hyYHlZ/Xwp3/azdf:XSEclx7QedyIIQ+wZoXkJ5dH/XwNIdf
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\Y: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\M: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\N: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\P: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\Q: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\U: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\W: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\S: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\T: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\A: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\E: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\G: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\H: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\I: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\R: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\V: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\J: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\K: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\O: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\Z: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\B: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe File opened (read-only) \??\L: a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2116 a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe 2116 a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a65ed848316cda8499381dd084a0c3e8_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2116